Upload
vudieu
View
215
Download
0
Embed Size (px)
Citation preview
HIPPOCRATIC DATA SHARING IN E-GOVERNMENT
SPACE WITH CONTRACT MANAGEMENT
Yoganand Aiyadurai
April, 2015
ii
HIPPOCRATIC DATA SHARING IN E-GOVERNMENT
SPACE WITH CONTRACT MANAGEMENT
By
Yoganand Aiyadurai
(21347510)
Submitted in partial fulfilment of the requirement of the degree
MAGISTER TECHNOLOGIAE: INFORMATION TECHNOLOGY
In the
DEPARTMENT OF INFORMATION TECHNOLOGY
FACULTY OF ACCOUNTING AND INFORMATICS
DURBAN UNIVERSITY OF TECHNOLOGY
Supervisors:
Prof. Dr. OLUGBARA O. OLUDAYO
Prof. Dr. THIRUTHLALL NEPAL
April 2015
iii
Dedication
This dissertation is dedicated to my dear sweet little angel:
Tanvi Aiyadurai
She is my motivation, inspiration and the liveliness.
iv
Acknowledgement
To my supervisors Professor Dr. O. O Olugbara and Professor Dr. Thiruthlall Nepal, I have
been eternally grateful for your leadership, patience, critique, motivation and valuable inputs
in my research work. I appreciate your expertise, wisdom, cheerful encouragement and vast
research knowledge that came in handy towards shaping this research. I am always motivated
with your positive energy.
To my family for tolerating me and supporting me during the course of study.
v
Declaration
I, Yoganand Aiyadurai, hereby declare that the dissertation submitted for the degree Master in
Information Technology at the Department of Information Technology, Faculty of
Information Technology at Durban University of Technology, Durban South Africa, is my
original work and has not been previously submitted to any other institution of higher learning
by other persons or myself. I further declare that all the sources cited and quoted have been
acknowledged accordingly by means of a list of references and footnotes.
Student:
_____________________ ____________
Yoganand Aiyadurai Date
Approval for final submission
Supervisor:
_____________________ ____________
Prof. O.O. Olugbara Date
Co-Supervisor:
_____________________ ____________
Prof. T. Nepal Date
vi
Table of Contents
Dedication ................................................................................................................................. iii
Acknowledgement ..................................................................................................................... iv
Declaration ................................................................................................................................. v
Table of Contents ...................................................................................................................... vi
List of Tables ............................................................................................................................. ix
List of Figures ............................................................................................................................ x
List of Abbreviations ................................................................................................................. xi
Artefacts ................................................................................................................................... xii
Abstract ................................................................................................................................... xiii
CHAPTER 1 : INTRODUCTION ............................................................................................. 1
1.1 Problem Statement ............................................................................................................ 5
1.2 Research Question ............................................................................................................ 6
1.3 Research Goal and Objectives .......................................................................................... 7
1.4 Research Methods............................................................................................................. 7
1.5 Study Scope ...................................................................................................................... 8
1.6 Contributions .................................................................................................................... 9
1.7 Synopsis .......................................................................................................................... 10
CHAPTER 2: LITERATURE OVERVIEW ............................................................................ 11
2.1 Definition of e-Government ........................................................................................... 11
2.2 Opportunities for E-government ..................................................................................... 12
2.3 Challenges of E-government .......................................................................................... 15
2.4 Growth Stages of E-government .................................................................................... 17
2.4.1 Inception Stage ......................................................................................................... 17
2.4.2 Maturity Stage .......................................................................................................... 18
2.4.3 Innovation Stage ...................................................................................................... 19
2.5 State of e-Government Development in Developing Countries ..................................... 21
2.6 Rationale for E-Government Data Sharing .................................................................... 29
2.7 Barriers to E-Government Data Sharing ........................................................................ 30
2.8 E-Government Data Sharing Models ............................................................................. 32
2.9 Literature Summary ........................................................................................................ 33
CHAPTER 3 : STUDY METHODOLOGY ............................................................................ 36
vii
3.1 Design Science Research ................................................................................................ 36
3.2 Hippocratic Data Sharing ............................................................................................... 40
3.3 Modelling of Data Sharing Gateway System ................................................................. 42
3.3.1 Objectives of the DIG Framework ........................................................................... 43
3.3.2 High Level DIG Architecture .................................................................................. 44
3.3.3 Managing Hippocratic Data Contract Policy ........................................................... 45
3.3.3.1 Manage Users ........................................................................................................ 46
3.3.3.2 Mange Departments .............................................................................................. 47
3.3.3.3 Manage Database Connections ............................................................................. 47
3.3.3.4 Manage Publications ............................................................................................. 48
3.3.3.5 Manage Data Contracts ......................................................................................... 48
3.3.3.6 Manage Department Data Contract Access .......................................................... 49
3.3.3.7 Manage Audit Logs ............................................................................................... 49
3.3.3.8 Approve a Data Contract ...................................................................................... 50
3.3.4 Sequence Diagram for Inter Department Communication ...................................... 50
3.3.4.1 Current Scenario ................................................................................................... 50
3.3.4.2 Future Scenario with DIG system ......................................................................... 52
3.3.5 Meta Model Class Diagram for the DIG System ..................................................... 53
3.3.6 Use Case Diagram for the DIG System ................................................................... 54
3.3.7 Hippocratic Model on which the research is premised ............................................ 56
3.3.8 Prototype Evaluation ................................................................................................ 57
3.3.9 Dissemination .......................................................................................................... 57
3.9 Limitations ...................................................................................................................... 57
CHAPTER 4: PROTOTYPE SYSTEM EVALUATION ........................................................ 59
4.1 Prototype Implementation .............................................................................................. 59
4.2 Evaluation Components .................................................................................................. 61
4.2.1 Manage Login .............................................................................................................. 63
4.2.2 Define Department ...................................................................................................... 65
4.2.3 Manage Connection String .......................................................................................... 69
4.2.4 Authorise Contract ....................................................................................................... 70
4.2.5 View Audit Log ........................................................................................................... 71
4.3 Evaluation Constructs ..................................................................................................... 73
4.4 System Evaluators .......................................................................................................... 74
4.5 Evaluation Procedure ...................................................................................................... 75
4.6 Evaluation Results .......................................................................................................... 77
viii
CHAPTER 5: DISCUSSION AND CONCLUSIONS ............................................................ 80
5.1 Summary of the Study .................................................................................................... 80
5.2 Benefits of Data Integration Gateway ............................................................................ 82
5.3 Future Work .................................................................................................................... 85
5.4 Concluding Remarks ...................................................................................................... 86
REFERENCES ......................................................................................................................... 88
ix
List of Tables
Table 2.1: Barriers to inter-organisational data sharing ............................................... 31
Table 2.2: Summary of Related e-Government Model ................................................ 35
Table 3.1: Role and responsibility of the users ............................................................ 55
Table 3.2: Functions needed for the prototype development ....................................... 56
Table 4.1: DIG system evaluation constructs and statements ...................................... 74
Table 4.2: Distribution of system evaluators ............................................................... 75
Table 4.3: Evaluation Methods Used in this Study ...................................................... 76
x
List of Figures
Figure 2.1: E-Government reforms at the inception stage (1990-99) .......................... 18
Figure 2.2: E-Government reforms at the maturity stage (2000-2010) ........................ 19
Figure 2.3: E-Government reforms at the innovation stage (2011-2020) .................... 20
Figure 2.4: Waseda University E-Government world ranking 2013 (de Jager and van
Reijswoud 2008) ...................................................................................................... 23
Figure 2.5: Overlapping of e-governance .................................................................... 24
Figure 2.6: Human activity infrastructure of e-government model ............................. 25
Figure 2.7: E-government maturity model ................................................................... 26
Figure 2.8: Model of e-inclusion .................................................................................. 27
Figure 2.9: Collaborative e-government forces ............................................................ 28
Figure 3.1 Design science research cycle (Vaishnavi et al. 2004) ............................... 38
Figure 3.2: DIG system architecture ............................................................................ 45
Figure 3.3: UML sequence diagram for inter department communication current
scenario .................................................................................................................... 52
Figure 3.4: UML sequence diagram for inter department communication with DIG .. 53
Figure 3.5: Data sharing gateway – UML meta model ................................................ 54
Figure 3.6: Use case diagram for the DIG system ....................................................... 55
Figure 4.1: “DIG Login” screen ................................................................................... 63
Figure 4.2: “Manage Login” screen ............................................................................. 64
Figure 4.3: “Create Login” or “Edit Login” screens are similar to each other ............ 64
Figure 4.4: “Define Department” screen ...................................................................... 65
Figure 4.5: “Create Department” screen ...................................................................... 66
Figure 4.6: “Create Publication” contract screen ......................................................... 67
Figure 4.7: “View Data Contract Information” screen ................................................ 68
Figure 4.8: “View Data” screen ................................................................................... 69
Figure 4.9: “Manage Connection String” screen ......................................................... 70
Figure 4.10: “Create Connection String” screen .......................................................... 70
Figure 4.11: “Authorise Contract” screen .................................................................... 71
Figure 4.12: “View Audit Log” screen ........................................................................ 72
Figure 4.13: “Search Audit Log” screen ...................................................................... 72
Figure 4.14: Mean of user interaction and system usability measurements ................. 78
Figure 4.15: DIG application evaluation using unit tests with passed test case ........... 79
xi
List of Abbreviations
B2G Business-to-government
DBA Database Administrator
DIG Data Integration Gateway
DHA Department of Home Affairs
DSR Design science research
DUT Durban University of Technology
G2B Government-to-Business
G2C Government-to-Citizens
G2E Government-to-Employee
G2G Government-to-Government
G2N Government-to-Non-profit
G2P Government-to-Public
HDBs Hippocratic databases
ICT Information communication technology
IDABC
Interoperable Delivery of European e-Government Services to public
Administrations, Businesses and Citizens
IDC Industrial Development Corporation
IIS Internet Information Server
IOW Inter organizational workflow
N2G Non-profit-to-Government
OCL Object constraint language
SAPS South Africa Police Service
SDSR Soft design science research
SQL CE Structured Query Language Compact Edition
TCP Transmission Control Protocol
UML Unified modelling language
WAS Windows Application Service
WCF Windows Communication Foundation
xii
Artefacts
The Data Integration Gateway (DIG) system prototype is deployed on the web for evaluation
and demo purposes. This prototype is awaiting for patent from Durban University of
Technology (DUT). The URL details and the login details are provided below:
DIG system URL: http://yogiaiyadurai-001-site1/
Login details
a) Global Admin (Role: Data contract authorizer)
User name - globaladmin
Password - Globaladmin15$%
b) Department Admin (Role: Data contract manager)
Metro department admin
User name - metroadmin
Password - Metroadmin15$%
SAPS department admin
User name - sapsadmin
Password - Sapsadmin15$%
Home Affairs department admin
User name – homeaffairsadmin
Password - Homeaffairsadmin15$%
c) Department User (Role: Data contract visualizer)
User name – deptuser1
Password – Deptuser115$%
xiii
Abstract
The research reported in this dissertation focuses on seamless data sharing in e-government
space because of the intrinsic complexity, disparity and heterogeneity of government
information systems as well as the need to improve government service delivery. The often
observed bureaucracy in government processes, especially when verifying information,
coupled with the high interdependency of government departments and diversity in
government operations has made it difficult to improve government service delivery
efficiency. These challenges raise the need to find better ways to seamlessly share data
between government to citizens, government to businesses, government to suppliers and
government to public institutions. Obviously, efficient automatic data sharing is an important
phenomenon that contributes to improvements in communication, collaboration, interaction
and efficiency in the service delivery process because it reduces information verification time
and improves reliability of information.
The general applications of data sharing systems become perceptible in institutions
such as banks and government establishments where information verification is highly
necessary in the process of service delivery. Data sharing usually occurs between a data
holder and a data requester when copies of authorized data are transported from the source
databases to the requester. This data sharing process should guarantee a high level of privacy
because of the confidential nature of certain data. A data integration gateway (DIG) is being
proposed in this research as a methodological solution to seamlessly share data in e-
government space, using Hippocratic database principles to enforce data privacy.
The DIG system is a centralized web application that utilizes a lightweight database
within the government data centre to hold information on data contracts, data sources,
connection strings and data destinations. The data sharing policies are stated as contracts and
once indentures on how to share data are established between different data publishers, it is
possible to ensure a seamless integration of data from different sources using the DIG
application being proposed in this dissertation. The application is malleable to support the
sharing of publisher data that are stored in any kind of database. The proposed DIG
application promises to reduce costs of system maintenance and improve service delivery
efficiency without any change to the existing hardware infrastructure and information systems
residing within different government departments.
1
CHAPTER 1 : INTRODUCTION
Data sharing is an important phenomenon that allows for disparate and heterogeneous
information systems to effectively communicate supported by seamless transportation of data
from sources to the target destinations. It is the ability to distribute data resources that are
stored in one or more disparate data servers in the network to multiple applications or users.
Data sharing is a key concept in ‘open government’ initiatives. Such initiatives inspire
governments to share their data thereby forming a shared environment and encouraging
innovation regarding provision of improved services for citizens and society. An effective
form of data sharing can transform government into a smart-government. The industrial
development corporation (IDC) defines smart government as “the implementation of a set of
business processes and underlying information communication technology capabilities that
enable a seamless flow of information (data) across government agencies and programmes to
become intuitive in providing high quality of information and citizen services, increase
efficiency, transparency and openness across all government programmes and activity
domains” (Rubel 2011). The first important mission for the success of smart government is to
share government data with citizens, which is called government-to-citizens (G2C) sharing
(Choi et al. 2013). In general, governments collect huge volumes of data items such as
demographic, asset ownership, criminality, health, financial and traffic data and store them in
their information systems or store them as manual documents, depending on the situation.
The sharing of government collected data in an unprecedented manner may create innovative
products and services for citizens, businesses and governments (Choi et al. 2013).
Automatic sharing of data is particularly useful in a complex e-government space to
improve efficiency of service delivery. In this dissertation, an e-government space is defined
as a multidimensional virtual ecosystem of data sources, information systems, data providers
and data consumers where different dimensions represent the diverse automated resources
and functions of government. An example of an e-government space is the virtual space of
automated resources and functions of two government departments, South Africa Police
Service (SAPS) and Department of Home Affairs (DHA). The virtual space spanned by
SAPS and DHA completely describes the automated resources and functions of these two
departments together with how these functions and resources are shared in relation to external
agencies. Data sharing places a huge demand on data security or privacy because of the
confidentiality of different kinds of data that are kept in such a virtual space.
2
There are many existing techniques for ensuring that data are kept secure, prominent
amongst these being cryptography and secured network channels. While these traditional
techniques provide acceptable solutions to data security problems to a certain extent, they can
still be compromised because of the impossibility to achieve 100% security in real life. In
addition, these techniques provide little confidence to data providers because resource
providers are not directly involved in the data security process. It is prudent therefore to
provide several layers of data security to increase the confidence level of data publishers or
owners in e-government space.
In recent times, researchers have proposed a set of Hippocratic database principles as
a way of securely managing disclosure of privately owned data (Massacci et al. 2006). The
attractiveness of the Hippocratic database principles is that they guarantee respect of privacy
principles in data management. This research reports on a Data Integration Gateway (DIG)
which is based on Hippocratic database principles to improve and speed up the delivery
process of government services through seamless sharing of data. The idea of a DIG as
proposed in this research is motivated by the elementary principles of the Hippocratic oath
that apply to information systems to afford data security by applying privacy and
confidentiality principles (Agrawal et al. 2002; Azemovic 2012). The very factor that makes
the internet a powerful medium for seamless sharing of personal data has also led to criticism
over the loss and violation of privacy (Kim and Kim 2010). The research community must
therefore be concerned with the great challenges of open data, big data, and the reliability of
stored data and fool proof computing when designing new information systems. There must
be no compromise with the security and privacy features of those information systems. The
security and privacy must also be simple enough so that they are easily understood by an
average user (Bernat et al. 2003). The maintenance of privacy controls becomes more
complex across diverse distributed and heterogeneous systems that differ in operating
systems and requirements where data security policy is often overlooked (Skinner and Chang
2006).
The focus of this research is on using the Hippocratic database principles to achieve
seamless data sharing within the e-government space. The rapid advancement in information
technology directed to the incorporation of computers with telecommunication gadgets in
government institutions and private sectors has made it possible to improve the government
service delivery process. Governments across the world have shown a willingness to reap the
power of information communication technology for providing improved service delivery
and to improve the effectiveness, responsibility and ease of service access along with
3
increased openness and transparency in government actions (Choudrie et al. 2005). The use
of information communication technology, particularly the internet, to transform government
processes is often called e-government, which is a multi-faced and varied field that must be
carefully managed and supported by the government. The field of e-government is a concept
that is ever changing and improving with the availability of new technologies and emerging
challenges. Taking into cognisance the variety of solutions needed to implement seamless e-
government, a general solution to fulfil all the requirements of seamless e-government and to
come up with a common work process is very difficult to achieve. The essential elements of
e-government are the following (Heeks 2001; Mkude et al. 2014; Grundén 2012):
a) E-administration – this solution is for refining the existing process or methods in
government that can lead to reduced costs, improved performance and empowerment
of strategic decision making.
b) E-service – this solution is for linking the government with the citizens, wherein the
government consults with the citizens to support democracy and help improve the
efficiency of public services.
c) E-society – all the entities within society such as business, citizens, private sectors and
communities are connected together to work better outside the limitations of the
government.
The accomplishments in e-government can be measured on the basis of effective
collaboration between different sectors of government departments, businesses and citizens
(Jaeger and Thompson 2003). The different types of collaborations often associated with e-
government that can bring about significant opportunities to governments, citizens,
businesses, employees, non-profit organisations and social-political organisations are the
following (Yanqing 2011):
a) Government-to-government (G2G) – this involves communication and internal
exchange of resources between government departments through an online platform
to create an obvious impact on efficiency and effectiveness of service delivery.
b) Government-to-business (G2B) – this involves the electronic transaction activities
such as e-procurement of goods and services between government departments and
businesses.
c) Business-to-government (B2G) – this involves online transaction initiatives such as e-
procurement and development of an e-marketplace for government purchases and
procurement of tenders for sales of goods and services.
4
d) Government-to-citizen (G2C) – this involves offering public services online through
electronic service delivery to increase the accessibility of citizens who consume those
government services.
e) Citizen-to-government (C2G) – this involves online business transactions such as tax
payment, issuance of certificates, renewing of motor driving license that citizens can
initiate to engage directly with government.
f) Government-to-employee (G2E) – this involves online initiatives that will facilitate
the management of the civil service and internal communication with government and
its employees to make e-career applications and processing systems paperless in e-
office.
g) Government-to-non-profit (G2N) – this involves online information communication
services provided by the government to non-profit organizations, political parties,
legislatures and social organizations.
h) Non-profit-to-government (N2G) – this involves online exchange of information
communication services between non-profit organizations, political parties,
legislatures and social organizations and government.
The collaborative sharing of data in e-government space can be appositely classified
as a new type of e-government called government-to-public (G2P) sharing (Choi et al. 2013).
The G2P sharing paradigm advocates for openness to receive data or information pertaining
to citizens and share them in a timely manner amongst government agencies that need those
data or information towards enhancing the efficiency of public service delivery. This also
facilitates the creation of integrated personalized services that can be delivered to citizens
anywhere, anytime and to any device, transcending space, time and device differences. This
would sustain the smart-government development, allowing different types of data and
information sharing environments. However, provision of secure and trusted data in
information sharing is the utmost critical issues that will prevent leakage of secret and
sensitive information (Choi et al. 2013).
The study reported in this dissertation contributes to one of the four central research
questions in e-government, which is how decentralized government operations can be
seamlessly integrated (Scholl and Klischewski 2007). Moreover, the research concretely fits
into three research themes, namely information quality, data privacy and personal identity as
well as crossing borders that require governance proficiencies as identified in the eGovRTD
2020 project (Wimmer et al. 2008).
5
1.1 Problem Statement
Although e-government offers several opportunities such as increasing efficiency in
streamlining government procedures, refining internal communication and to provide better
customer services, it is still facing many challenges, including value realisation (Juell-Skielse
and Perjons, 2010), multi-technological chaos (Rosengren and Ohlsson, 2011), privacy,
security and disparities in computer access (Yang, 2011). In the context of South Africa, the
current huge concern for the government is the disconnected resources and operations of
various government departments. All the departments have their own internal information
systems catering for their own immediate needs without considering the future needs of data
sharing that can facilitate improved service delivery. Departments are not seamlessly
connected but instead are operating in silos. The automation of government activities in a silo
brings in danger and other challenges as governments cannot consolidate and standardize
their operations, preventing governments from reducing costs of maintaining their
information systems. Governments can massively reduce costs, time and effort needed for
running the operations of their information systems by promoting merging, elimination of
duplication and normalization of information systems through the process of secure data or
information sharing. The freed up resources can then be used for other useful projects that
may benefit society at large (Cowell and Martin 2003).
The Department of Public Service and Administration of the Republic of South Africa
has mentioned that the greatest hurdle is to upgrade the existing information systems across
government departments and to use cloud computing and web technologies at different levels
and for different processes. This change will enable the government to reduce the costs of
system maintenance and will pave the path for integrated e-government (DPSA 2014). The
following issues, therefore must be adequately tackled (Lofstedt 2012; Cordella 2013;
Linders 2012):
a) The speed of service delivery process must be at acceptable levels.
b) Reducing costs of the infrastructure changes by using the existing infrastructure when
the changeover happens.
c) The latest and most efficient technology must be used to fulfil government mandates.
d) Develop a vision of a connected government and use information technology to
support government objectives and a broader development agenda.
6
e) Document, re-engineer and streamline administrative and business processes to
deliver simpler, more effective services to citizens, businesses and other stakeholders,
thereby contributing to the strategic objective of customer service improvement.
f) Develop and implement immediate and interim measures to support effective and
secure information technology environment for governments.
g) Build the institutional arrangements and governance in which an effective team is
supported to realize much needed transformation and the building of a secure, cost
effective and aligned information technology capability on behalf of the state.
h) Redefine, rebuild and reinvent an information technology model for government or
single public service.
Any two separate government institutions willing to collaborate effectively must
define a common process, policies and outline the workflow. The inter-organizational
workflow (IOW) is a framework used by most organizations to support effective
collaboration between the varied and distributed business processes of diverse organizations
to achieve a shared goal. The management of the diverse organizations is the ultimate
problem in the IOW and remains the main reason for the failure in many e-government
projects. In addition, numerous other problems related to e-government still exist, such as
self-motivated work space, committed environment, semantic data interoperability and
technical interoperability. The information systems within the government space also face
two major problems, which are technological interoperability and data heterogeneity
(Chaabane et al.). Hopefully, seamless data sharing mechanisms in e-government space can
help to address the challenges of effective collaboration, openness, and transparency and
information quality.
1.2 Research Question
The intrinsic problems hindering effective interaction between government departments or
their information systems can be adequately resolved through a seamless data sharing
mechanism. As a result, arising from the problem statement is the following research
question being pursued in this study:
How should data be seamlessly shared in e-government space such that privacy of an
individual or an organisation is not overly compromised?
7
1.3 Research Goal and Objectives
Stemming from the research question enunciated, the overarching aim of this study is to
create a web application, is based on Hippocratic database principles, to support seamless
sharing of data in e-government space. The study at hand is guided by the following research
objectives:
a) To enable seamless data sharing across diverse government departments without any
changes to the existing system infrastructure.
b) To control the volume of data sharing more securely across government departments
using a coherent contract management technique implemented according to
Hippocratic database principles.
c) To reduce the time delay often experienced during cross verification of data involved
in government services.
d) To maintain a high level of consistency when data are shared across government
departments.
e) To eliminate the storage of duplicate data across government departments by sharing
the data from the source of truth.
1.4 Research Methods
The methodology of this study is primarily “soft design science research” (SDSR). The goal
of design science research (DSR) is to solve important business problems by creating and
developing good solutions using the latest information communication technology. The DSR
depends on the use of demanding methods to build and evaluate a design artefact (Hevner
and Chatterjee 2010). The creation of a lighter approach to DSR to address the important
business problems was suggested (Baskerville et al. 2009). Soft system methodology (SSM)
is an outstanding system science method to tackle the social-technical complications facing
an organisation. The SDSR methodology combines the principles from SSM with DSR to
provide a design thinking methodology to solve real world problems using good technology.
SDSR provides the possibilities to create new ways to progress and advance organisations
related to humans and to coherently tackle socioeconomic issues. SDSR enables the process
of developing solutions by following through the phases of design, implementation and
evaluation of a technological artefact. It enables identification and delineation of a specific
problem to solve. The problem must be articulated as a specific set of system requirements.
8
The requirements for the precise problem defined are then abstracted and converted into a
general problem with a technical, procedural and social dimensions. A common solution
design or a class of solutions for the general problem is then derived through systems
thinking and concretely expressed in terms of the general requirements. The general design
requirements are then compared with the precise problem for fitness. In this activity, the
precise problem has to be re-articulated in terms of the general requirements. A declarative
search is thereafter made for the particular components that will deliver a workable instance
of a realistic solution to the general requirements. An instance of the specific solution is
constructed, evaluated and deployed in the social system setting (Baskerville et al. 2009).
Crucial to the application of SDSR methodology in this study is the adoption of the unified
modelling language (UML) as a useful tool to support the modelling, visualisation and
representation of the components of DIG artefact being proposed. The UML helps to
facilitate different modelling activities of SDSR and DSR, such as exploration for general
components of a solution, together with ability to express the functionalities of the artefact
using imperative logic. The UML through its object constraint language (OCL) expressions
offers the capability of imperative logic to express constraints of the DIG application.
1.5 Study Scope
This research was motivated by the experiences faced by the citizens when accessing the
services of South African government departments. With the e-skills Colab at Durban
University of Technology behind the motivation of this research study, a cost effective DIG
solution is proposed to enable seamless data sharing between government departments that
will help to speed up government services without any changes to the government
infrastructure. The significance of the study is geared towards improving the service delivery
of South African government departments. The systematic documentation of the research
process, implementation of the proposed DIG application and results of the evaluation of the
study will greatly contribute to the information technology and e-government knowledge
domains. In particular, the significance of this study, is to deliver the services of the
government faster by eliminating the waiting period for data verification across inter
departments within the government space.
The scope of the research study at hand is limited to the government departments
within South Africa. The prototype DIG application for this case study is designed to solve
the process of current data sharing within government departments, which currently are
9
mainly a manual process and time consuming. However, the DIG application has a wider
usefulness and can be used by any organization that wants to speed up their process of data
sharing in the most secure way with data contract agreements.
1.6 Contributions
This research proposes the development of a lightweight data integration gateway (DIG),
which is a web application that can be used to facilitate seamless sharing of data maintained
by different disparate and heterogeneous information systems. The proposed DIG application
satisfies the following requirements:
a) Convenient – the language based on contract management policy borrowed from
Hippocratic database principles for specifying data of interest is intuitive, simple and
user friendly.
b) Preservation – enforcing data privacy policies through a set of contract agreement
policies that do not require any change to the current database systems managing the
source databases.
c) Persistency – data privacy policies could be created, stored and can be managed as
contracts in an external database that is private to the gateway.
d) Protection – contents of source databases are not altered, no data write access given to
the gateway and data read by the gateway from the source databases are not stored in
the database maintained by the gateway, but such data are delivered to the requesters
as portable files.
The potency of the Hippocratic data sharing approach being proposed in this study is
built on two technical properties. Firstly, it supports field and record level data privacy
enforcement policies. Secondly, it allows full use of the standard structured query language
(SQL) query capabilities to express policies for seamless data sharing. In more detail, the
contributions of the research reported in this dissertation are:
a) The investigation of an approach for a seamless Hippocratic sharing of data
maintained by different heterogeneous information systems with specific reference to
e-government space.
b) The examination of several implementation issues of a seamless Hippocratic data
sharing technique, including secure metadata storage, efficient query formulation
policies and data structure for the storage of contract information.
10
c) The experimental evaluation of the proposed application shows that the data sharing
approach has low overheads and speeds up data sharing and information verification
time.
The original research reported in this dissertation piggybacks on a number of existing
techniques and principles to evolve DIG for a seamless sharing of data with focus on e-
government space. However, the proposed application has a much wider spectrum of
applications. A growing range of possible application areas are in content management
applications, customer/consumer support services, e-commerce and e-education which
require intensive levels of data privacy. Many such applications may use security policies to
seamlessly access control data and eliminate duplication of data. The dissemination of the
results of this research will definitely contribute to knowledge sharing in the e-government
field.
1.7 Synopsis
Chapter 1 of this dissertation introduces the background to the research and discusses the
need for data sharing across government departments with particular reference to the South
Africa scenario. In addition, the context of the problem domain, the research question that
guides the study, the goals and objectives of the study, the research methods used, the scope
of this study and decisive contributions of the study are clearly delineated in this chapter.
Chapter 2 comprehensively discusses the related literature on e-government, data
sharing and Hippocratic data contract. Chapter 3 provides the systematic documentation of
the research design and holistic approach that is followed in modelling the proposed
prototype application for the Hippocratic data sharing management within the e-government
space. This chapter also unpacks the theoretical foundation that guided the research and how
the soft design science research methodology was systematically followed in designing the
prototype data sharing application being proposed in this study. Chapter 4 presents the
implementation of the prototype data sharing application and discusses the evaluation of the
artefacts in addressing the research problem. Chapter 5 discusses the results, presents the
reflection of the researcher and concludes with recommendations for further research.
11
CHAPTER 2: LITERATURE OVERVIEW
This chapter focuses on providing a rigorous and structured overview of relevant
literature with regard to their coverage of description of e-government, opportunities for e-
government, challenges in e-government, growth stages of e-government, the state of e-
government in developing countries, technology adoption for data sharing in government
departments and e-government data sharing models.
2.1 Definition of e-Government
There exists numerous e-government definitions in the literature, but they are all associated
with the use of information communication technology (ICT), mainly the internet, to
transform, re-engineer, improve or enhance government business processes. The term
“information communication technology” covers internet technologies, internet applications,
internet services and internet based components that are needed to execute business solutions
more effectively and more efficiently. Sinawong (2008) states e-government as the use of
ICT, particularly the internet, as media to achieve a better government that delivers improved
public services and enhances internal department works in a more useful, customer oriented
and cost effective manner. Yanqing (2011) states that e-government is the use of ICT to
improve government processes and re-engineer government services. Fang (2002) defines e-
government as the innovative use of ICT to provide more convenient access to government
information and services, making government services accessible from anywhere anytime.
This in turn improves the quality, reduces time delay and encourages more participation
between the government and citizens. Nkwe (2012) argues that ICT has changed the way
human activities are performed in different sectors around the world. Yanqing (2011) states
that implementing e-government crosses many service delivery, legislative, digital divide,
privacy, public access, and information security issues.
In general, governments across the world see ICT as a protagonist for government
reform because their aspiration is to improve the welfare of citizens and to deliver quality
services that add value to the citizens. Private companies have adopted ICT quickly and
12
across the spectrum to do their daily business more efficiently. Information communication
technology has also changed the way governments deliver services to their citizens and
businesses as well as how they communicate and interact with people who need government
services. A visit to government departments is a not a pleasant experience as the services
offered by government is characterised by a lot of paperwork with the intrinsic manual
process, long queues for each section of services, inadequate spaces and a lot of frustrations
related to inefficient services. The transition around the world to using ICT for government
service delivery has provoked citizens to demand better services from the government. The
public sector and governments are under heavy pressure to deliver the services at the needed
time and with high quality. Citizens and business organisations prefer engaging government
services without having to physically go to the government departments. Governments are
doing their best to tackle these expectations by reforming and re-engineering the existing
government processes and translating them to ICT automated processes.
2.2 Opportunities for E-government
The effective application of e-government to fulfil the aspirations of citizens and businesses
is the cardinal motive of governments across the world. Governments are putting a strong
effort on using ICT to redefine, re-engineer and reorganise public services to better serve
their citizens. ICT provides efficient resources and a platform for data sharing, information
dissemination and communication, which are the key functionalities needed for effective
public participation in government. In order to seamlessly integrate all the information
systems in the government departments to support massive citizen’s participation in
government activities, the existing work processes which brought about e-government in the
first place must be improved, redesigned or re-engineered. The government process redesign
opens up new possibilities for information availability, communications possibility, seamless
services to its citizens and good planning process through the use of e-government
(Bhattacharya et al. 2012). The assurance of E-government is to make the government more
responsive, efficient, legitimate and transparent, which is a technical, economic and social
problem.
Ndou (2004) pointed out a long time ago that government and the public have realized
the several opportunities offered by ICT to fulfil the insatiable demands of citizens. ICT in
government reforms have great potential to provide better services to the citizens and can
increase government efficiency by enabling the restructuring of the existing process in the
13
government. The challenge of e-government is how to help facilitate citizens-to-government
interactivity and make service delivery more efficient by allowing data or information
sharing. Moreover, the current structure of government departments and their information
systems are disparate and filled with virtual boundaries, making it difficult to achieve
effective data sharing with minimum costs. The challenge of inter-organizational or inter-
department data sharing has given rise to organizational boundaries. Data sharing overcoming
cross-boundary in terms of departments and integrating them has been long identified as
major enablers for improving government departments and organizational efficiency (Thakur
and Singh 2012). The government of any nation can achieve healthier strategic decisions and
better-quality problem solving techniques when its departments have aggregated data and
knowledge sharing across boundaries (Mohammed et al. 2012).
Researching the significance of inter-department data sharing, vertical and horizontal
directions data sharing have been identified and a theoretical framework for understanding
the boundaries in data sharing initiatives has been defined (Thakur and Singh 2012). The
integration of various information systems inside and across external organizational
boundaries remains costly and time-consuming (Mohammed et al. 2012). This is because of
heterogeneity of computing environments involved and a shortage of technical infrastructure
in the public sector. The growing cooperation of organizations has resulted in the need to
share data more effectively. The sharing of information is still affected by privacy concerns,
organizational structure and technical issues, which have to be taken into account (Asogwa
2013). The existing literature studies have identified a host of opportunities that e-
government offers, including the following:
a) To increase efficiency by streamlining the business process: implementing e-
government could decrease the number of stages involved in tedious business
processes and functions that are currently manual. This saves effort and time and
reduces the pressure around government offices (Ndou 2004; Almarabeh and AbuAli
2010; Singh and Karaulia 2011).
b) To improving internal communication: using ICT to connect within local
government can be made easier. Tracking of the events and programme happening in
each department is easier. Head of the department can keep the executives up-to-date
with regular communications and emails (Almarabeh and AbuAli 2010; Singh and
Karaulia 2011).
c) To providing better customer service: giving self-service access to information via
the internet can definitely improve citizen’s access to government services.
14
Technologies like automated telephone systems can improve citizen services (Ndou
2004; Singh and Karaulia 2011).
d) To keep pace with citizen expectation: society is being moved to the latest
technologies, citizens and business are working electronically and therefore they
expect the same from their local government (Singh and Karaulia 2011).
e) Sharing data constantly and consistently: data sharing leads to transparency,
openness, anticorruption and accountability as citizens participate in decision making
with the government based on information at their disposal. Government will be run
by the people because individuals are well informed about government activities
(Ndou 2004; Singh and Karaulia 2011).
f) Reducing cost or increasing revenue: implementing e-government leads to
centralizing government information systems and removes duplication of information
and processes, thereby reducing cost and increasing government’s revenue (Singh and
Karaulia 2011)(Singh and Karaulia 2011).
g) Restructuring of administrative process: moving to e-government changes the way
government interacts with citizens, business and other governments. This requires the
restructuring of internal and external administrative processes so that they are more
efficient (Singh and Karaulia 2011).
h) Data and process standardization: when data sharing is enabled with the
implementation of government processes then most of the processes and formats of
protocol used can be standardized across government departments (Hwang et al.
2004).
i) Clearly defined authority and responsibility of users: the users of e-government
are accountable and responsible for the outcome of the services. This speeds up the
service delivery process from the government end (Hwang et al. 2004).
j) High security: security and privacy are the key feature of e-government. Centralized
systems within government data centers and secure access to government information
increases the security of the systems and data when compared to the decentralized
systems without e-government (Hwang et al. 2004).
k) Decreasing corruption: every service from every government department do exactly
as per the rules and processes defined (Almarabeh and AbuAli 2010).
l) Trust building: e-government systems build trust between the government and the
citizens by prompt, efficient, secure, cost effective service delivery from the
government (Almarabeh and AbuAli 2010).
15
2.3 Challenges of E-government
Although e-government offers several opportunities for transforming government operations,
there are still huge challenges. In the context of South Africa for an instance, the
characteristics and challenges of data sharing amongst governments seem to be similar
among all government departments. Although each government department has a centralised
computing system for data storage and retrieval, the operation of departmental data is vertical
integration between the head office and its regional or suburb offices. There is no
provisioning of services that request for intra data sharing across different government
departments that are disparately distributed. The current process of data sharing in many
government departments in South Africa is still a manual process, which is very time
consuming and prone to errors. The various studies from different government departments
have identified environment, external and internal factors as hindering the process of data
sharing in government departments (Davison et al. 2005; Kasim 2008; Tsai et al. 2009). Even
though the internet infrastructure in South Africa ranks highly, this infrastructure is not used
much. To overcome the infrastructure and the application upgrade challenges to use the latest
internet technologies will take a long time. The fastest way to implement and enable data
sharing amongst government departments, which is the motivation for this research, is to use
the existing infrastructure and still provide for data sharing.
As the internet is linking the vast majority of people together, the advancement of e-
government represents government’s reaction to the shifting world of information technology
(Xu, W and Zhou 2008). With the e-government initiative the traditional government can
tackle the traditional problems of government services, using the latest internet technologies
and modern communication devices. This initiative will enable government to transform to e-
government, but comes with many challenges that must be taken into account to
accommodate the difficult relationships between government and its constituencies to enable
transaction interaction and the delivery of government services (Wang and Hou 2010). The
literature has identified a number of common challenges facing e-government across the
world, including the following:
a) Technological and infrastructure development: implementation of the latest
hardware technologies to accommodate modern internet and web technologies.
This is a very costly transformation from traditional government to e-government
16
(Reffat 2003; Hwang et al. 2004; Ndou 2004; Sinawong 2008; Xu, W and Zhou
2008; Khan et al. 2010; Wang and Hou 2010; Dawes et al. 2012).
b) Security: security is costly and must be adequately addressed in the design phase
of e-government. Security leads to trust, which is a vital component of e-
government (Reffat 2003; Sinawong 2008; Xu, W and Zhou 2008; Yanqing
2011).
c) Interoperability: the ability to make systems and organizations work together
seamlessly to enable data sharing and a comprehensive overhaul over the legacy
systems is crucial for success of e-government (Reffat 2003; Almarabeh and
AbuAli 2010).
d) Privacy: protecting the privacy of citizens’ personal data and government
department’ private information, while enabling data sharing, is an important
consideration for successful e-government (Reffat 2003; Sinawong 2008; Yanqing
2011).
e) Digital divide: this refers to the gap between people who have access to the
internet and those who do not. Without internet the people cannot access the data,
information or services which the government wants the citizens, business and
government to access (Reffat 2003; Xu, W and Zhou 2008; Sang et al. 2009;
Khan et al. 2010; Yanqing 2011).
f) Transparency: the lack of transparency between government and people prevents
the public form actively participating in government decision making process
(Reffat 2003; Ndou 2004; Almarabeh and AbuAli 2010).
g) Web based service delivery: the establishment of a secure e-government
infrastructure and web based service delivery can be consider a difficult task
because of the unavailability of technical personnel (Juell-Skielse and Perjons
2009).
h) Awareness of potential costs: lack of awareness of the potential cost of e-
government amongst e-government practitioners can lead to implementation
failure (Sinawong 2008; Dawes et al. 2012).
i) Leadership and management factor: political leadership with a clear vision is
vital to ensure the successful implementation of e-government and efficient
change management processes (Hwang et al. 2004; Ndou 2004; Sinawong 2008;
Sang et al. 2009; Yanqing 2011; Dawes et al. 2012).
17
j) Legal substructure: the laws and regulation required to permit and to support the
move to e-government are often not promulgated in many countries (Reffat 2003;
Hwang et al. 2004; Xu, W and Zhou 2008; Sang et al. 2009).
k) Institutional infrastructure: e-government can only progress if there are
institutions capable of supporting and implementing the technology at low cost
(Sang et al. 2009; Khan et al. 2010).
l) Low human capital index: absence of ICT literacy skills and lack of readiness of
local content and national language versions of government websites is a serious
challenge (Ndou 2004; Khan et al. 2010).
m) Trust: e-government systems must be built and installed with trust from agencies
across governments, business, Non-Governmental Organisations (NGOs) and
citizens. They are the end users and their buy-in is a must to make the e-
government systems successful (Almarabeh and AbuAli 2010).
2.4 Growth Stages of E-government
The original research reported in this dissertation has classified the growth stages of e-
government into inception, maturity and innovation based on decades of advancement in ICT.
2.4.1 Inception Stage
During the periods of 1990 to 1999, the implementation of e-government made significant
interaction between government employees and their departments easier. Computing
technologies such as minicomputers, mainframe computers and desktop computers were
predominantly used to automate the business processes of government. Meanwhile, the
service subscribers or citizens faced difficulty in accessing services mainly because of
interdependency between various government departments. There was considerable delay in
the verification of data or information pertaining to a subscriber when more than one
government department had to be consulted. Figure 2.1 portrays this scenario, wherein high
communication latency can be observed between service providers and service subscribers,
but there was low communication latency between government departments. This was due to
the fact that individual service subscribers had to physically visit each government
department for a service subscription process to be successfully completed. The inception
18
stage can be likened to the first generation e-government, which is more about computing
adoption by government for business process automation.
Figure 2.1: E-Government reforms at the inception stage (1990-99)
(Tallo 2013)
2.4.2 Maturity Stage
The advancement in e-government technology from 2000 to 2010 made the interaction
between government employees and subscribers easier. This was the period of electronic
transformation of government business processes. During the period, the world experienced
massive applications of computing power through the emergence of the internet and web
applications to offer government services online. The maturity stage can be likened to second
generation e-government in which technology enabled government transformation into
subscriber-centric and integrated government. The subscribers could access services within a
particular government department without feeling the interdependency that exists across
diverse government departments. However, as shown in Figure 2.2, this improvement in
service delivery does not eliminate the complication in the interaction between service
providers and government departments, making service delivery inefficient. This was because
of high interdependency between government departments and inability of different
government information systems to seamlessly interoperate and share subscriber data
effectively (Tallo 2013).
19
Figure 2.2: E-Government reforms at the maturity stage (2000-2010)
(Tallo 2013)
2.4.3 Innovation Stage
The current e-government vision for 2011-2020 is to solve data interoperability problems to
improve efficiency in service delivery. The period 2011-2020 is regarded as an innovation
stage of e-government or third generation e-government where technology will enable
government transformation into smart government. During this period computing power,
such as cloud computing, mobile devices, smart televisions, sensor and wireless devices,
mobile networks and phatic technology will be used to transform government processes that
allow citizens and civil society to co-create with government. Phatic technology is any kind
of technology such as social media – Facebook, LinkedIn, Twitter and WhatsApp – that
facilitate communication, content sharing, collaboration and interaction amongst people. The
use of big data analytics, which is the discovery and communication of meaningful patterns
in data, will drive government policy action, facilitate effective communications, rapid
transaction execution and improve service delivery. There will be openness, transparency,
accountability, innovative services, data privacy and massive availability of information for
knowledge creation and knowledge transfer. Governments across the world will able to
provide service bundles for governmental one-stop-shop to their subscribers as an effective
20
way of improving service delivery (Linders 2012). The one-stop-shop service allows
subscribers to get everything they need in just one stop without any officialdom.
This new version of innovation in government offers the reward that efficient
interaction between subscribers and government departments will be facilitated by web,
internet, cloud and mobile phones using a central government gateway. The central gateway
will absorb all the convoluted interactions using a mobile cloud service technology to deliver
real-time innovative services to subscribers (Tallo 2013). Figure 2.3 portrays this innovation
in e-government business processes.
Figure 2.3: E-Government reforms at the innovation stage (2011-2020)
(Tallo 2013)
The research reported in this dissertation purports to lay a solid foundation for smart
government and can be classified as contributing to the innovative stage of e-government.
This research proposes Hippocratic data sharing management in e-government space in order
to significantly contribute to the future e-government vision. The Hippocratic data sharing
mechanism requires a data sharing contract to be established between government
departments that want to participate in the data sharing process. This implies that any
information that is required by a subscriber would automatically be sent to the target source
which is the publisher, provided that information resides elsewhere centrally within the e-
government space and the subscriber can access the data by contract. In the context of this
research, a contract denotes the specification of rules or policies governing data disclosure. A
particular government department or an institution, for example, adopts a data disclosure
21
contract to specify who is allowed to access what data and for what purpose data may be
disallowed to each recipient (Agarwal 2012). The contracts are expressed in a simple and
understandable privacy language.
2.5 State of e-Government Development in Developing Countries
Implementing e-government to fulfil the needs and aspiration of citizens and business are the
main motive of governments across the world. Governments are putting strong efforts into
redefining and reorganizing public services for the benefits of their citizens. With e-
government, data sharing and easy communication is made possible, which are the key
functionalities needed for public participation in government. In order to facilitate seamless
integration of all the systems in the government departments, the existing work process must
be improved and redesigned. This required redesign opens up possibilities of achieving
information availability, effective communications and good planning processes. The key
emphasis of e-government across countries is to provide seamless services to its citizens
(Bhattacharya et al. 2012).
Many developed countries of the world have successfully implemented e-government
which is making an impact on, and changing the lives of, their citizens. There are a lot of case
studies that illustrate this direction. The IDABC (Interoperable Delivery of European e-
Government Services to public Administrations, Businesses and Citizens), which is the
European Union Program that promotes the correct use of ICT for cross-border services in
Europe (IDABC 2009). There is also the IBM Smarter Government initiative that promotes
collaboration from the local council to international level in the United States of America.
When we compare the countries in the Africa in terms of their state of e-government
development, against the rest of the world, it can be stated without any doubt that African
nations have to go a long way to achieve the full benefits of e-government implementation.
There are several challenges in African countries such as scarcity of internet access, lack of
proper internet infrastructure, lack of transparency and accountability in government, that are
hindering e-government development.
Mutula (2008) points out that from an African perspective, finding a precise status of
e-government implemented in sub-Saharan Africa is difficult because the majority of case
studies conducted on e-government do not fully cover each and every country in the
designated location. Thakur and Singh (2012) state that in recent years there has been
increased pressure from citizens and business on governments to deliver quality services that
22
are more efficient, reliable, convenient and faster. The applications, systems and platforms
designed to fulfil the requirements of quality services are referred to as e-government. E-
government services are being provided by connecting the government, citizens and business,
but the availability of such services are few and expensive. Due to this reason citizens are
raising their anger and are demanding improved service levels. In order to achieve
government-centric services, they must be developed to fulfil citizen led initiatives.
Heeks (2001) reiterates that e-government programmes in South Africa are usually
implemented by following the top-down approach. This approach focuses on management
ideas and therefore the requirements of the citizens are not as much in focus as they should
be. In order to provide a robust and better public service delivery, good and smooth
communication between the government and citizens is a must. E-government platforms in
developing countries provide an excellent channel for communication between government
stakeholders and the public in real time. E-communications have become gradually more
essential for interacting, communicating and exchanging data/information in the workplace.
Many of the organizations are dispersed and are geographically isolated, so e-communication
is a can solve inherent communication problems (Abodohoui et al., 2014).
Rorissa et al. (2011) benchmarked e-government development in a sample of sub-
Saharan government websites. They placed Algeria, Angola, Benin, Botswana and Burkina
Faso as the top 5 countries with developed e-government. South Africa was placed in the 49th
position out of 58 countries. The research work at the Waseda University for nine years
monitored and surveyed the development of e-government worldwide and has scored
Singapore, Finland and USA as the top countries that are well developed in e-government
amongst the 55 countries that were studied. Figure 2.4 shows this result of e-government
development ranking, where it can be seen that only four Africa countries featured in the
raking. South Africa was ranked 36, followed by Nigeria (ranked 47), then Egypt (ranked 48)
and Tunisia (ranked 53).
23
Figure 2.4: Waseda University E-Government world ranking 2013 (de Jager and van Reijswoud 2008)
In many developing countries of the world, government is redesigned by two types of
emerging trends. The top most trend is decentralized, hierarchical and vertical government
systems to the polycentric networks of governance, built on horizontal integration between
different departments and multifaceted societies. The next change is the introduction to ICT
that is targeted at transforming the delivery of public services. The e-governance concept is a
merger of these two trends (de Jager and van Reijswoud 2008).
Heeks (2001) mentioned three separate, but interconnected practical domains of e-
governance (Figure 2.5) that when implementing e-government must be carefully considered
and proper analysis must be done to avoid the overlap and duplication of their functionalities.
These domains are:
a) E-Administration – improving the business processes of government using ICT.
b) E-Services: connecting individual citizens with their governments using ICT.
c) E-Society: building interactions with and within civil society using ICT.
24
Figure 2.5: Overlapping of e-governance
(Heeks 2001)
The governments in developing countries are under intense pressure to review and
update their business processes (Jager et al. 2008). The developed countries that have
implemented e-government are asking the developing countries to support decentralization,
decrease corruption, increase transparency and to participate in the global digital information
sharing. The private sectors in the developing countries are demanding additional openness
and are keen to participate in open and transparent relationships with the governments. The
citizens of these countries are demanding faster and better services and are demanding to
extend the government services to rural areas. (Beynon-Davies 2007) states that over the last
few years, many deficiencies are present in the current documented formations of e-
government. Moreover, the majority of them are around the lack of holistic conception that
takes into consideration, the full socio-technical environment of the government processes.
E-government therefore must solve the complex societal problems taking the
technical and process change. Beynon-Davies (2007) presents a number of metal models that
are organised around the vertical dimension that considers the aspects of infrastructure, which
are made up of human activity infrastructure long with the informatics infrastructure. The
horizontal dimensions use e-government business models, which are G2B, G2C and C2C and
the value creating system (VCS) that supports the human activity. Figure 2.6 shows the
human activity infrastructure of the e-government model where all human activity system in
internal and external value chains will depend on information systems for effective, robust
and efficient collaboration and harmonization of activities.
25
Figure 2.6: Human activity infrastructure of e-government model
(Beynon-Davies 2007)
Davison et al. (2005) illustrated a transition model for the conversion from
government to e-government and the steps needed in this process. The purpose of their model
was to provide a guide for governments to clearly understand the motivations for the need of
e-government, and to avoid any possible problems during the transition. They stated that in
traditional government the perception of the government is a slow-moving and delayed
administration, resisting to change with new technology, inconvenient and confusing process.
In this type of government the citizens and business involve with the government in
numerous areas, but because of the lengthy process and absence of new technology, a vast
amount of paperwork is created. The early adoption of internet technologies promotes the
automation of the existing government process with less redesign and innovation. The
authors also stated that a good e-government characteristics should be openness, clearness of
purpose and immediate responsiveness to its citizens along with its internal efficiency and
effectiveness. Hence, they proposed the e-government maturity model and the strategic
transformation to e-government (Figure 2.7). The mature e-government is recognised by the
high levels of competence, performance and includes data sharing across government
26
departments and units that will help to reduce process times within the workflow of each
government department.
Figure 2.7: E-government maturity model
(Davison et al. 2005)
Sahraoui (2007) addresses the high failure rates of e-governments in developing
countries because of the presence of a “design-reality-gap” where e-government programs
did not mirror the reality of government. Sahraoui’s view is that e-government should
improve the activities and services of government by making government services more
accessible, effective and accountable. When government services are delivered online via e-
government to citizens, efficiency is achieved. The governance model of e-government
increases the participation of the citizens in the affairs of their government. Sahraoui (2007)
therefore proposes the e-inclusion model of the governance, which should be a stage of e-
government adoption. This stage demands that all citizens within the government should have
equal access and opportunity to the mechanics of service delivery from the government.
Equal opportunity is achieved through a partnership between the government, the private
sector and civil society. Figure 2.8 shows the e-inclusion model, which can be useful only
27
when political, economic, technological and social barriers are removed and access to e-
government opportunities is equitable.
Figure 2.8: Model of e-inclusion
(Sahraoui 2007)
Chun et al. (2012) state that interactions occur within and across G2G, G2B, G2C and
between international governments in a still and dynamic fashion. The collaboration from the
interactions therefore increases the effectiveness of government by inspiring partnerships,
participation and engagements across government. They pointed out that the motivations of
e-government collaborations between G2G, G2B and G2C may differ and are made up of
diverse motivational forces that drives collaborative e-government (Figure 2.9). The value-
driven forces shape the governments to deliver better decision making skills and increases
better service provisioning and to achieve domain specific goals. The main benefits of
28
collaborative government is the sharing of data or information that permits a smooth process
design and that offers better and timely services for its citizens. The collaborative e-
government applies collective intelligence for innovative solutions to the problems as well as
offer a shared governance that adopts the trust and confidence of citizens in government.
Figure 2.9: Collaborative e-government forces
(Chun et al. 2012)
Chen et al. (2011) argues that many of the recent studies shows indifference between
the e-government models and e-government advancement around the world. Many of the
models were developed for the improvement and understanding of e-government in the last
decade. Chen et al. (2011), therefore, suggested a three-dimensional model for e-government
advancement for better administration and improved service delivery. This three-dimensional
model proposes that taking ICT alone will not attain the best result for the quality and
service. The other four factors in the e-government development, which are effectiveness,
appropriate functionality, governance and capability of the applications with respect to the
efficiency and quality and the applications themselves must play a vital role in the
accomplishment of e-government implementation (Chen et al. 2011).
29
2.6 Rationale for E-Government Data Sharing
Previous authors have argued that information communication technology (ICT) has
dramatically changed the way human activities are performed in different sectors around the
world (Fang, 2002; Ndou, 2004; Nkwe, 2012). Private companies have embraced ICT to
deliver improved services. ICT has changed, tremendously, the way governments deliver the
services to their citizens and businesses as well as how they communicate and interact with
the people needing government services using a technology called e-government. The
governments in many developing countries are striving to improve the welfare of citizens and
to deliver quality services that add value to the citizens. However, many services offered by
governments are still associated with a lot of paperwork coupled with manual processes, long
queues for each section of service, inadequate spaces and a lot of frustrations related to
inefficient services. The public sector and the governments are under intense pressure to
deliver services at the needed time and with high quality. Citizens and business preferably
want services without physically going to government departments. Governments are doing
their best to tackle the demands of citizens by reforming and re-engineering the existing
government processes and translating these processes into automated ICT solutions.
E-government has a great potential to provide improved government services to the
citizens and can increase efficiency by restructuring the existing process in government
departments. However, the actual challenge of e-government is how to help facilitate citizen
to government interaction and to make service delivery more efficient. Data/information
sharing can be helpful in speeding government service provisioning, but the current structure
of government departments and their information systems are disparate and distributed with
virtual boundaries, which make it more difficult to achieve effective data sharing with
minimum costs. The challenge of inter-organizational or inter-department data sharing has
given rise to organizational boundaries. Data sharing can be useful in overcoming barriers of
cross-boundary because integrating government departments has been long identified as a
major enabler for improving organizational efficiency (Thakur and Singh 2012).
Governments can also achieve healthier strategic decisions and better-quality problem
solving techniques when their departments have aggregated data and knowledge sharing
mechanisms (Mohammed et al. 2012).
30
Researching the significance of inter-department data sharing (Thakur and Singh
2012) identified vertical and horizontal directions for data sharing and they defined a
theoretical framework for understanding boundaries in data sharing initiatives. The
integration of various information systems inside and external to organizational boundaries
remains costly and time-consuming (Mohammed et al. 2012). This is because of
heterogeneity of computing environments involved and a shortage of technical infrastructure
in the public sector, which is a real challenge. The growing cooperation of organizations has
resulted in the need to share data more effectively. The sharing of information is still affected
by privacy concerns, organizational structure and technical issues, which have to be taken
into account (Asogwa 2013). Data sharing across government sectors and departments forms
an important component of e-communication system. de Jager and van Reijswoud (2008)
point out several advantages of e-communications amongst which are the following:
a) Cooperation between teams and collaborative teamwork.
b) A complicated business process that can be solved.
c) Rapid communication with the administration and stakeholders.
d) Cost effective communication as traditional process like postage usage, telephony and
travel expenses are eliminated.
e) Due to openness the complex layers of management are reduced.
f) Instant accessibility to information makes strategic decision making easier and faster.
g) Contributes to improved public administration performance.
h) A red-tape orientation in organizations is removed.
2.7 Barriers to E-Government Data Sharing
From a review of the literature it is evident that are many challenges and difficulties to be
faced while implementing e-government. The important factors that indicate the success or
the failure of e-government acceptance may vary according to the location of the country and
its local context. The barriers facing successful e-government data sharing were identified to
include lack of good ICT infrastructure, lack of good digital security and privacy issues
(Lofstedt 2012). Privacy of data/information and digital security is a very severe technical
barrier that was identified by many of the researchers and this serious concern was mentioned
in many journals of e-government implementation (Ostberg 2010). The barriers in developing
countries are much more than ICT and e-government implementation. The basic needs for the
citizens and the control of corruption, poverty eradication, increasing the literacy levels,
31
upskilling the poor ICT skills and the technical ability and solving the power crisis are other
barriers that must be resolved before looking at e-government data sharing in developing
countries (de Jager and van Reijswoud 2008; Al-Rashidi 2013). The barriers to efficient e-
government that can hamper effective data sharing as identified by Lofstedt (2012) are as
follows:
a) No strong ICT hardware and software Infrastructure.
b) No proper project planning and inadequate knowledge about e-government program.
c) Absence or shortage of security and privacy of data and information.
d) Nonexistence of capable and skilled workforce.
e) The cultural difference within the government and across departments.
f) Good guidance from the leaders and poor management support.
g) Absence of well-defined policies and guideline for e-usage.
h) Lack of partnership with 3rd party service providers.
i) Deficiency of proper strategic plans.
j) Resistance from the entities involved in e-government to change to change over to e-
systems.
k) Unavailability of financial funding and resources.
Table 2.1 summarizes the barriers to inter-organisational data sharing as pointed out
by (Debnath et al. 2008).
Table 2.1: Barriers to inter-organisational data sharing
(Debnath et al. 2008)
Barriers Details
Institutional culture issues The issues related to ideological, technical complexity, politics,
history, ideology, muscle power and even location falls under this
category.
Conflicting priorities among
participating organizations
Different data standards, leadership issues, hardware equipment,
department’s interest and different levels of training are part of this
category.
Absence of resources Deficiency of skilled human and latest technical resources.
Poor implementation of
standards
Difference with data definitions, data formats and data models
across the organisations.
Overheads of coordination Expenses encountered while coordinating activities across different
organizations.
32
2.8 E-Government Data Sharing Models
Makedon et al. (2003) proposed a negotiation-based data sharing system called SCENS
(Secure Content Exchange Negotiation System). The SCENS was developed at Dartmouth
College which is a multi-layer scalable system that brings guarantee to transaction safety
using several security mechanisms. The system was based on a metadata with varied
information and was then applied to a number of various domains. They proved that with
vulnerable and disseminated information, government users may bring an agreement on the
conditions of data/information sharing by negotiation.
Liu and Chetal (2005) suggested an interest based trust model and data sharing
protocol to solve the difficultly of data/information sharing between government
organizations. The proposed protocol integrated a varied range of information rules and
policies, along with trust negotiation during information exchange. The added policies made
the parties who are interested in sharing data to be dependent upon each other. The protocol
was implemented using the latest internet technology of XML web services. The
implementation is suited for the Federal Enterprise Architecture (FEA) reference models and
can be integrated into the e-government systems.
Ager et al. (2006) developed a set of policy based technologies to enable data/information
sharing across government departments easy without negotiating individual privacy or
information security. The model design consists of line-grained access controls that support
filter semantics for complex policy condition. A policy ability assists to consolidate
information from multiple sources to the source’s original disclosure policies. Creation of a
department that allows departments to apply item-level security arrangements and disclosure
policies. The auditing of histroy of each information accessed in the system is also avaliable.
The auditing method screens information derivations along the time to support the evaluation
of information quality. The ultimate goal was to offer the possibility of solving major
information sharing problems in government departments and to offer direction for the
expansion of upcoming government owned insformation systems.
Sandhu et al. (2006) projected the ways where recent Trusted Computing (TC)
technologies can help in secure data/information sharing, compared to those not offering pre-
TC technology. The Policy, Enforcement and Implementation (PEI) framework produced by
them highlights three distinct layers at which security policy and design decisions need to be
made. The PEI framework made possible to evaluate in detail, the potential TC applications
for secure information sharing in their upcoming work.
33
Fan and Zhang (2007) had presented a conceptual model for data/information
exchange in digital government infrastructure. They found out that the Government-
Government (G2G) information sharing model will assist in the understanding of G2G
information sharing and can assist decision makers in making decisions with regards to G2G
information sharing. Fan and Zhang tested the conceptual model with the purpose of finding
the factors that influence electronic (or digital) government information sharing. The model
was highlighted via a case study under the Chinese government system.
Headayetullah and Pradhan (2009) proposed a protocol for sharing data securely
across different government agencies for the main motive of streamlining government
services. This protocol was proficient and innovative for trust-based data sharing, exchange
of confidential information amongst government intelligence agencies across national and
international boundaries using public key encryption. The protocol uses MD5 algorithm for
data integrity and public key across cryptosystem for confidentiality and authentication and
complex mapping for agency identification. The protocol supports privacy protection and
information sharing with possible restrictions based on the trust level maintained between the
donor and the receiver of information. The protocol ensures secure and streamlined
information/data sharing within government intelligence agencies to avoid threatening
activities.
Oberholzer et al. (2012) presented a Hippocratic privacy protection framework (HPP)
which is based on the concept of privacy contract. This prototype was used for protecting
personal information in cooperate organisations, which are becoming increasingly concerned.
Decision criteria that are needed for privacy protection are very complex. A classic problem
in this context concerns about giving the individuals an improved control over their personal
information, and at the same time allows the organisation to process its transactions based on
the same personalised information. A prototype of the HPP framework was built to serve as a
proof of concept in order to demonstrate the developed HPP framework becomes applicable
and therefore serve as an efficacious model for solving privacy problems. With this
prototype, the HPP framework afforded individuals more control over their personal
information.
2.9 Literature Summary
The chief motive of this research study is to come up with a data sharing working prototype
system for e-government that can enable data sharing with data contract management as a
34
practical implementation tool for security and privacy protection. The development of the
framework underlying the development of data sharing system was inspired by the following
models.
a) Hippocratic privacy protection framework (HPP) by Oberholzer et al. (2012) –
decision criteria that are needed for protecting privacy and control over personal
information when sharing information.
b) Policy based technologies model by Ager et al. (2006) – consolidation of information
from multiple sources across departments, subjected to the source’s original
disclosure policies.
c) Sharing secure information between protocol by Headayetullah and Pradha (2009) –
trust-based information sharing protocol that can provide secure exchange of
information, with authentication and encryption.
d) Policy based technologies to enable information sharing by Ager et al. (2006) –
auditing method that traces information changes over time along with consolidation of
information from multiple sources across departments, subject to the source’s original
disclosure policies with.
The potential merits of using the Data Sharing Gateway (DIG) originating from this research
study as a proof-of-concept formalism are the following:
a) The DIG enables both the column and row level privacy protection of information
that can be implemented through the data contracts.
b) The DIG model is a lightweight web application framework that can connect to any
type of database to enable information sharing.
c) The DIG model can be implemented within governments to enable data sharing,
without any changes to the existing hardware infrastructure and the software
applications.
The common goals of all the data sharing models as uncovered from the literature in
the course of this study are the following:
a) To enable seamless information sharing in government, private or corporate
departments.
b) To seamlessly implement trust and security policies using trusted computing
technologies.
c) To seamlessly integrate security and privacy related policies with data sharing
protocols.
35
In this chapter of the dissertation, the researcher found it expedient to conclude with a
succinct summary of e-government models and problems solved in related studies (Table
2.2).
Table 2.2: Summary of Related e-Government Model
E-government model description Problem Addresses
SCENS: Secure Content Exchange Negotiation
System proposed by Makedon et al. (2003), is a
multi-layered saleable systems that brings
surety to transactions safety.
Content Exchange Negotiation System that distributed the
information to government users based on the condition of
sharing information.
Government (G2G) information exchange in
electronic government infrastructure using
information sharing conceptual model by Fan
and Zhang (2007)
Government-Government (G2G) information/data sharing
in e-government, assistance in framing decisions.
Sandhu et al. (2006) projected methods using
recent computing technologies and how it can
assist with the secure information sharing,
compared against those that did not offer pre-
TC technology.
PEI framework with policy, enforcement, and
implementation models. The framework helped
identifying possible TC applications that can support
secure information sharing.
Ager et al. (2006) developed a group of policy
based technologies that enable information
sharing across government agencies without
negotiating individual privacy and information
security.
Line-grained access controls, A adhesive policy ability
that supports joining of information from multiple sources
from the source’s original disclosure policies, disclosure
policies, item level security classification, and auditing
method that keeps track of information derivations over
time, addressed key information sharing problems in
government agencies.
Liu and Chetal (2005) suggested an innovative
information sharing protocol and interest based
trust model to resolve the issue of information
sharing across government agencies.
Integration of wide range of information policies with trust
negotiation, sharing data to be interdependent upon each
other, XML Web Services, for digital government.
Oberholzer et al. (2012) presented a
Hippocratic privacy protection framework
(HPP) that is based on the concept of privacy
contracting.
Prototype for protecting personal information to cooperate
organisations, decision criteria needed for privacy
protection, better control over their personal information
allowing process of transaction, efficacious model for
solving privacy problems.
Headayetullah and Pradhan (2009) proposed a
protocol capable of sharing secure information
between different government organisations for
the purpose of streamlining government
services.
Using the MD5 algorithm for data integrity, public key in
cryptosystem for secrecy and authentication, complex
mapping for agency identification, privacy preference and
information sharing based on trust level, trust based
protocol for sharing top secret information among
government intelligence agencies.
36
CHAPTER 3 : STUDY METHODOLOGY
This study proposes to use the design science approach to construct and develop a data
sharing application technology that is focused on values and principles of Hippocratic
database technology for managing disclosure data that can be incorporated into e-government
space. The task of safeguarding privacy in the latest information system is vital for system
users. The conventional method taken is to apply privacy policies at the application level by
issuing queries on the database thereby retrieving the result. The application then scans the
record set and then filters restricted information. But, this method leads to privacy beaches
when the same method is applied at the cell level. The use, trust and confidence of system
users depend heavily on the degree of privacy provided by the system and its platform. The
answer for the above-mentioned problems could be found when using Hippocratic database
principles.
3.1 Design Science Research
The research discipline of information systems comprises behavioural science research (BSR)
and design science research (DSR), which are complementary paradigms with the intention
of addressing the fundamental problems that face the productive application of information
technology (Hevner and Chatterjee 2010; Olugbara and Ndhlovu 2014). The goal of BSR is
truth and the goal of DSR is to seek and stretch the boundaries of human and organizational
proficiencies by constructing new and innovative artefacts. Truth tells a design whereas
utility informs theory that leads to where truth can be combined into the design (von Alan et
al. 2004). BSR is concerned with underlying theories that provide insights and inform
researchers about interactions amongst people, technology and organizations. On the other
hand, DSR addresses the fundamental problems of people and organizations through the
construction, utilization, and evaluation of artefacts, or systems that provide the utility to
transform an existing situation into a more preferred one (Olugbara and Ndhlovu 2014).
DSR enables the evaluation of the capabilities of the intended user, which will be the
government employees providing government services to the citizens, business or to other
government departments. This evaluation allows for the understanding of how government
departments process their data sharing and those services demanding data sharing capability
37
from other departments and to discover those factors that delay the process of data sharing. It
can be therefore concluded that the DSR method supports the realization of the research goals
and objectives that were put forward in this study. In the present research study, the DSR
method was applied to study how government departments in South Africa conduct their
daily business transactions, as well as to construct and evaluate the suitability of a Data
Integration Gateway (DIG) for Hippocratic data sharing in e-government space.
The modelling of a software artefact called DIG serves as a proof of concept of this
study. The object constraint language (OCL) and unified modelling language (UML) serve as
useful modelling tools in the application of DSR. The UML is widely accepted by industry
and academics for formal modelling and specification of software systems. It offers a
standard method to visualize the design of a software system. The OCL is a formal system
specification language within UML for defining the well-formed constraints and queries for
UML and OMG related meta models. It extends the UML by adding precise semantics to
visualize UML models. A modeller from a modelling approach must combine illustrative and
formal languages. Within the UML, the OCL is an additional language for UML. The OCL is
a universal standard for adding expressions that increase important information to object
oriented models. The DIG system is an innovative system, so UML and OCL are used
(Oberholzer et al. 2012). OCL has the features of a formal language, modelling language and
an expressive language that depend on the defined UML data types and thus contains some
facets of UML.
The DSR is a set of analytical and synthetic techniques for carrying out research in
information systems. DSR involves the creation of new knowledge through the design of
innovative artefacts. The analysis of the usage of such artefacts helps to understand and
improve the behaviour of features of information systems (Vaishnavi et al. 2004). These
artefacts enable individuals to implement information processing capabilities that move
organizations to achieve a set of desired goals (Baskerville et al. 2009). This study follows
the cognitive process (Figure 3.1) of the DSR model proposed by Vaishnavi et al. (2004).
The cognitive process groups the process steps into three groups, which are the abduction, the
deduction and the reflection abstraction.
In the cognitive process of DSR, the research begins by identifying the problem to solve,
which is also the awareness of the problem. Suggestions are made for the identified problem
such as how the problem should be solved and what resources are needed to solve the
problem. The problem solutions are drawn from the existing body of knowledge and an effort
is made to solving the problem creatively. The solution or group of solutions, which could be
38
an initial design, is constructed from the need requirements, followed by the design
specification and an artefact is developed. The partially or fully developed artefact is then
evaluated by comparing the functional requirements. This is an iterative phase where the
evaluation can go back to the development phase, suggestion phase and awareness of
problem phase. The flow from partial completion, going back to the awareness of the
problem is represented as the circumscription phase. The creative cognitive process of
abstraction and reflection are used in the conclusion phase, which specifies the termination of
the research cycle.
Figure 3.1 Design science research cycle (Vaishnavi et al. 2004)
The functional requirements for solving the problem of data sharing across
government departments were deduced from preliminary interactions with two South Africa
government departments, namely the Home Affairs (HA) and the South African Police
Service (SAPS) located in Durban of the KwaZulu-Natal province. The researcher examined
several official documents from both departments and interviewed staff from these
departments were also the end users, to pinpoint the research problem and to provide the
system requirements. Context-free interviews were used to gather the function requirements
of the DIG application. The use of context-free questions by the interviewer helped to avoid
prejudicing the response (Escalona and Koch 2004). The context-free interviews were then
39
analysed, brainstormed and converted into functional system requirements. The functional
requirements are necessary attributes in a system development lifecycle, which are narratives
that identify the capabilities, characteristics or quality factors of a system in order for the
system to give value and utility to end users (Sheikh et al. 2014). Some service quality
assessment models such as the analytic Kano model (Xu, Q et al. 2009) specifically suggest
early involvement of end users in functional requirements satisfaction measurement.
This study uses the DSR model (Vaishnavi et al. 2004; Baskerville et al. 2009) to
map the process steps involved in the development of the DIG system. The research problem
was tackled by following the phases as guided by the soft DSR methodology (Baskerville et
al. 2009):
a) Awareness of the problem:
Data sharing between government departments was identified as a major
problem for the slow delivery of public services.
Data sharing must be enabled to use the existing government databases and
infrastructures within each department and the devised solution must be cost
effective.
Data sharing within departments is considered highly confidential and is
secured within a department. Strict process, policies and rules are followed
when sharing data within government departments.
b) Suggestions:
The design of data sharing can be applied to any organization and for any
departments other than government organization. However, the confidentiality
of data is maintained through contracts or agreements of what must be shared,
and how and when the sharing should take place between the parties involved
in the transaction.
A centralised web application or an external agent system that can be used by
all departments for data sharing could ensure data security.
A lightweight web application using ASP.net web technology and a
lightweight database using SQL compact edition could be more suited to
create a workable instance of a solution that solves the data sharing research
problem.
40
c) Development:
The DIG functional requirements specification was written using UML-OCL
modelling language.
The DIG system prototype was developed using visual studio 2010 IDE, SQL
CE database and test driven development methodology.
d) Evaluation:
The evaluation of the DIG system was verified by test driven development and
manual system by the testers verifying against the functional requirements
specification.
e) Conclusion:
The DIG system developed in the research study is a workable, tested and
deployable solution that could be deployed to any government departments
that want to implement information sharing.
3.2 Hippocratic Data Sharing
Data or information sharing among governments and citizens are vital to any country
for speeding up the administration process (Harvey and Tulloch (2006). The government of
any country can become inefficient if the communication amongst the citizens and the
government breaks down abruptly because society can become unstable. Using the latest
technologies for communication, the connection between government and citizens can be
drastically improved. This communication problem between citizens and governments can be
better managed if the country is small, but for countries with large geographical areas and
massive populations management is very challenging. In some countries, there is a wide gap
between the rich and the poor communities and without efficient communication systems the
government is unable to effectively handle a good administrative system and the government
can lose control. Ndou (2004) states that fast development in information communication
technology (ICT) leads to widespread opportunities for proficient service delivery. Even with
the current advancement in technology that is secure and robust, most of the government
sectors have not fully explored the sharing of data methods because of the fear of data
41
sniffing or data leaks across the wires, when information is shared data out of the
departments.
The main competency which is needed for one-stop, connected, smart and networked
government that rapidly responds to vast needs of inter- and intra-departmental or
organizational needs for cross-national or inter-national needs are services such as data
sharing. However, to develop such proficient solution is very challenging and requires the
government to coordinate policies, share strategies and implement common frameworks
across its departments (Ebrahim and Irani 2005). Shared data services have been indicated as
a way of enhancing services to improve the efficiency of the service delivery and yet the
implementation of shared data services has proved to be difficult because of the operating
environments.
This research study originated from the identification of a research problem in the
government sector, regarding data sharing between government departments towards
improving service delivery. The sharing of data between government departments
hypothesizes the research problem as the central point of research and initiation of the
research process. The requirement of the main research problem is to search for a
technological solution framework that can effectively support data sharing amongst the
diverse government departments to ensure high level security and privacy. A more
demanding aspect of the solution is that data sharing must be possible without any massive
changes to the existing infrastructure and software applications. A holistic solution to these
challenges is the DIG, which is based on Hippocratic database principles. From a government
point of view, data will normally be published as a general privacy policy stating how the
data will be shared by departments.
In order to publish a common privacy policy, we propose customised and an
interactive manner of data sharing using the DIG system, with which the government
departments can connect and maintain its data contract policies. Primarily, the department
DIG administrator with other stakeholders of the department has to define all the data
contracts and publications in the DIG system so that the transactions and the data items that
are needed by every transaction can be processed into important information. The department
DIG administrator must also define the purpose of sharing data for each transaction and data
item and to whom the data should be shared. In addition, the definition of data contracts
follows the Hippocratic principles, which is applied to data to be shared and restricting
sensitive data.
42
The concept of Hippocratic databases (HDBs) was encouraged by the elementary
principles of Hippocratic oaths for the sole purpose of conserving secrecy and privacy in
information systems. HDBs contains a class of database system that accepts responsibility for
managing the security and privacy of data/information without hindering disclosure and
legitimate use (Grandison et al., 2008). HDBs guarantees to give authorization only to
authorized individuals and grants, direct access to sensitive data and that any revelation of the
data is only for used for authentic purposes. They empower individuals to consent to specific
uses and disclosures of their data and to verify the enterprise’s compliance with its privacy
policies (Grandison et al., 2008). HDBs use analytics and advanced data sharing methods to
enable enterprises to gain maximum value from data without negotiating individual privacy
or security.
The Hippocratic principles are implemented through the platform for privacy
preservation and role base access control model (Crépin et al. 2008). The DIG system
implements the ten Hippocratic principles, which are the following:
a) Purpose specification – the donor must know the purpose of sharing or restricting the
sensitive data stored in a database relation.
b) Consent – the donor must give informed consent to the data collected.
c) Restricted collection – indicates the minimal data collection required for the
understanding of the purposes.
d) Restricted use – this principle enforces policies on the database to use the gathered
data merely for a specific purpose.
e) Restricted disclosure – a database has to transfer the stored data just for the intended
purpose, with the donor’s approval.
f) Limited retention – information is available until the purpose of the utilization.
g) Accurateness – the accuracy of the data has to be enforced.
h) Safety – the safety of the data stored must be guaranteed.
i) Openness – all data are accessible which are shared.
j) Compliance – the donor of the data can at any point of time, verify the above
principles are respected.
3.3 Modelling of Data Sharing Gateway System
The main research aim of this study was to create a framework for data sharing across
government departments. The objective of this phase of modelling a data sharing gateway
43
was to understand the problem domain and constraints of the intended users. The
understanding of government department’s data sharing and the requirements gathering for
the DIG system was accomplished using the PaJMa model proposed by Chun et al. (2010).
The PaJMa model for structured approach to requirement gathering was originally generated
in the development of health information systems. For this research study and for the
development of the DIG system the, PaJMa model suited very well. The PaJMa model
increases the level of details in the requirements with the inclusion of non-functional
requirements, along with the identification of required practices, policies and metrics for the
requirements needed for the system. Chun et al. (2010) state that there are two type of
requirements that must be collected for a system development. These are functional and non-
functional requirements. The functional requirements are visible to the end user and the user
interacts with the system using the implemented function in the system. These functions must
be performed by the information system to capture and retain the user input into the system.
The world of information system depends on the scope of the information system and this
scope is defined through the functional requirements. The information system must contain
another type of requirement which is known as internal requirements for the system or the
non-functional requirements. The system’s internal requirements also known as non-
functional necessities are invisible to the end user and these are the functions that are internal
to the information system. This collection of features or software program requirements
define in what way the software program belonging to the information system must perform.
The collection of software program requirements is comprised of numerous governmental or
organizational structural processes, rules and policy based constraints that the information
system should strictly adhere to.
3.3.1 Objectives of the DIG Framework
The information gathered during the interactions with different government departments and
government service providers was for the development of a framework for information
sharing between government departments. The focus was primarily on the research problem
needs, not necessarily on any particular technology. The exercise in this research study leads
to the discovery of critical business processes and system requirements within the
government sector. The objectives of developing the robust framework for data sharing
between government departments are as follows.
44
a) To understand how the government services are delivered and the factors hindering
the speedy delivery to its citizens and businesses.
b) To implement a prototype system that enables government information sharing
securely between its departments through a web application with easy to use
interfaces.
c) To evaluate the efficacy of the implemented system for the government to share
information faster and securely between its departments.
In this phase of the DSR process, the objectives of the proposed DIG framework for
data sharing among government departments were identified and prioritized accordingly. The
high level framework for the DIG system is presented in Figure 3.2. The UML sequence
diagram for government inter-departmental communication based on the current scenario is
presented in Figure 3.3 and the UML sequence diagram for the government inter-department
communication after the implementation of the DIG system is presented in Figure 3.4.
3.3.2 High Level DIG Architecture
Figure 3.2 illustrates the high level technical architecture of the DIG system with the various
components on each system layer. The high level architecture shares the deployment and the
installation of software and hardware needed as well as the relationship among DIG system
components. The technical architecture of the DIG system is a web application (cloud based)
that resides within the government data centre to optimize the effort of delivering an instance
of the system to different government service providers. The DIG system is a 3-tier
architecture consisting of a lightweight Structured Query Language (SQL) Compact Edition
(CE) database, the middle service layer and the front-end interface which is a Silverlight web
application. Silverlight technology is a powerful development tool for designing and creating
appealing and interactive user experiences for mobile and web applications, and this
technology is supported by .NET framework from Microsoft. The layers of the DIG
architecture are the presentation layer, which is the User Interface (UI) layer, the business
logic layer and the data layer. The API layers talk to the Hippocratic data contract database
via the Hippocratic data contract database engine. The view data contract API uses the
Hippocratic data contract translation engine to formulate the data contract details and then
connects to the remote/intra department database to fetch the data thereby enabling data
interoperability across diverse government departments.
45
Figure 3.2: DIG system architecture
3.3.3 Managing Hippocratic Data Contract Policy
From a government department point of view, an assigned department’s Hippocratic data
contract administrator of the DIG system will normally publish a Hippocratic data contract
policy stating how the government department will handle the department’s information that
they wish to share. For publishing a general Hippocratic data contract policy, we put forward
a customised and an interactive solution using which a government department can create and
manage its Hippocratic data contracts. The department’s Hippocratic data contract
administrator defines all the transactions and data items that are needed for the Hippocratic
data contract via the DIG system. Once the Hippocratic data contract is added, the chief
46
Hippocratic data contract administrator verifies the Hippocratic data contract and approves
the publication.
Creation of the Hippocratic data contract metadata is made up of an automated script
that is run by the database administrator (DBA). The automated script installs the needed
relational tables and the prerequisite (master data) on the database used by the DIG system.
Any new metadata can be added on demand through the DIG system.
The features of the DIG system are represented using OCL. Using OCL we overcome the
limitations of UML when defining the detailed features of the DIG system design (Cabot et
al. 2012).
3.3.3.1 Manage Users
The context presented below inserts a new transaction in the user table in the DIG
system database. The user details will then be used to log into the DIG system.
context Transaction::addUser(
newUserId: Integer,
newUserName: String,
newPassword: String,
newRoleId: integer,
newIsAdmin: Boolean,
newIsLocked: Boolean,
newLoginExpiryDate: Date,
newEmailAddress: String,
newDepartmentID: Integer): Transaction
inv: self.User.UserId → isUnique(UserId)
def: newIsAdmin: Boolean = false
newIsLocked: Boolean = false
newLoginExpiryDate: Date = 365 days + sysdate
pre: self.transaction → excludes(newUserId)
post: self.transaction → includes(newUserId)
47
3.3.3.2 Mange Departments
The context presented below confirms a new transaction is added to the department table in
the DIG system database. The department details will be used by the DIG system for
participation in the data sharing.
context Transaction::addDepartment(
newDepartmentId: Integer,
newDepartmentName: String,
newLocation: String,
newFunction: String): Transaction
inv: self. Department.DepartmentId → isUnique(DepartmentId)
pre: self.transaction → excludes(newDepartmentID)
post: self.transaction → includes(newDepartmentID)
3.3.3.3 Manage Database Connections
The context presented below confirms a new transaction is added to the database connection
table in the DIG system database. The database connection details will be used by the DIG
system to connect to the remote databases in other departments and thus will enable data
sharing across departments.
context Transaction::addDatabaseConnection(
newDatabaseConnectionId: Integer,
newDatabaseServerName: String,
newDatabaseName: String,
newDatabaseLoginName: String,
new.DatabasePassword: String,
new.DatabaseConnectionString:String): Transaction
inv: self.DatabaseConnection.DatabaseConnectionID
→ isUnique(DatabaseConnectionID)
pre: self.transaction → excludes(newDepartmentID)
post: self.transaction → includes(newDepartmentID)
48
3.3.3.4 Manage Publications
The context presented below ensures a new transaction is added to the database publication
table in the DIG system database. The publication details will be used by the DIG system to
create the data contracts to share the data that will be accessed by the authorised DIG system.
context Transaction::addPublication(
newPublicationId: Integer,
newPublicationName: String,
newPublicationDataTable: String,
newAvaliableFields: String,
new.RestrictedFields: String,
new.DataFilter: String,
newDepartmentId:Integer): Transaction
inv: self. Publication.PublicationID → isUnique(PublicationID)
pre: self.transaction → excludes(newPublicationID)
post: self.transaction → includes(newPublicationID)
3.3.3.5 Manage Data Contracts
The context presented below confirms the addition of a new transaction the data contract
table in the DIG system database. The data contract details will be used by the DIG system to
access the published data by the departments to enable data sharing across government
departments.
context Transaction::addDataContract(
newDataContractId: Integer,
newPublicationId: Integer,
newDataContractName: String,
newDataContractTable: String,
newDataContractFields: String,
newDataContractTableFilter: String,
newDatabaseConnection: String,
newDataContractIsApproved:Boolean): Transaction
49
inv: self. DataContract.DataContractId → isUnique(DataContractId)
pre: self.transaction → excludes(newDataContractId)
post: self.transaction → includes(newDataContractId)
3.3.3.6 Manage Department Data Contract Access
The context presented below ensures an addition data to the department data contract access
table in the DIG system database. The department data contract access details will be used by
the DIG system to grant access to the data contracts to the users belonging to the assigned
departments.
context Transaction::addDepartmentDataContractAccess(
newDataContractId: Integer,
newDepartmentId:Integer): Transaction
inv: self.DepartmentDataContractAccess.DataContractIdDepartmentId
→ isUnique(DataContractId, DepartmentId)
3.3.3.7 Manage Audit Logs
The context presented below ensures that a new transaction is added to the audit log table in
the DIG system database. The audit log details is used by the administrator to monitor and to
check the activities of the DIG system.
context Transaction::addAuditLog(
newAuditLogId: Integer,
newUserName: String,
newSessionStartTime: Datetime,
newSessionEndTime: Datetime,
newModuleName: String,
newRole: String,
newAuditDate: DateTime,
newFunctionAccessed:String): Transaction
inv: self.AuditLog.AuditId → isUnique(AuditLogId)
pre: self.transaction → excludes(newAuditLogId)
50
newSessionStartTime:Datetime = sysdatetime
post: self.transaction → includes(newAuditLogId)
newSessionEndTime:Datetime = sysdatetime
3.3.3.8 Approve a Data Contract
The below presented context describes the process to activate a data contract.
context DataContract::approve(cDataContractId:Integer): Boolean
inv: self. references.verified = true
pre: self. DataContractIsApproved = false
post: self. DataContractIsApproved = true
3.3.4 Sequence Diagram for Inter Department Communication
The UML sequence diagrams for inter departmental communication between the DHA and
SAPS branch office are explained in this section.
3.3.4.1 Current Scenario
Government departs can be integrated in two ways for efficient communication, namely,
vertical and horizontal integration. Escalona and Koch (2004) defined vertical integration as
local and central governments that are integrated and therefore they can share functions and
services. Horizontal integration is the integration of government across all sectors that can
exchange functions and services. The application systems and the central database for each
department in most countries are vertically integrated. The government database of each
department resides at the government data centre. For example, all government offices
belonging to one department, irrespective of the location can access its own central database.
As shown in Figure 3.3, the DHA department across the country cannot directly access the
fingerprint data from SAPS for ID process of any person irrespective of the location.
Similarly, the SAPS department that generates fingerprint data cannot access the data
required to verify the fingerprint request that resides in the DHA department directly even
51
from the same location. The request for accessing fingerprint data has to go through the head
offices of DHA and SAPS from the local SAPS office. This is the cardinal cause of service
bureaucracy and delay in the current processes because the client has to wait for approval
until the data are verified. This process of client data verification takes up to two or three
weeks. Figure 3.3 shows the sequence diagram that models the interactions between the
objects of DIG system and the time ordering of those objects. The sequence diagram shows
the inter-department set up for four objects which are:
Branch office Home Affairs
Head office Home Affairs
Head office SAPS
Branch office SAPS
The head office of each administration has a centralized database and the branch
office reads and writes data to the centralized database. Branch offices of different
administrations can’t directly access each other’s head office data, thereby making data
sharing difficult. The request for data from one branch office to another head office is a 4 step
process. For example, as shown in the sequence diagram, if branch office Home Affairs
needs any data from head office SAPS then the sequence of the process is:
The Home Affairs branch office requests the needed info from SAPS head office to its
own head office.
The Home Affairs head office forwards this request to the SAPS head office.
The SAPS head office returns the data to Home Affairs head office.
The Home Affairs head office, then forwards the needed data to Home Affairs branch
office.
52
Figure 3.3: UML sequence diagram for inter department communication current scenario
3.3.4.2 Future Scenario with DIG system
The implementation and deployment of the DIG system can provide a direct interaction
between the Home Affairs branch office and SAPS head office as shown in Figure 3.4.
Similarly, the SAPS branch office can access data from the Home Affairs head office thereby
enabling inter-departmental communication.
53
Figure 3.4: UML sequence diagram for inter department communication with DIG
3.3.5 Meta Model Class Diagram for the DIG System
The UML class diagram and sequence diagrams are used to convert the knowledge model
into a specification model. All object classes and their relationships that are deduced from
UML models are implemented to give the software components of the system. The DIG
system presents eight classes and the relationships between the classes in the DIG system are
represented in the UML model. The interpretations of the six DIG relationships that exist
between classes are described as follows.
R1 – One department can have access to more than one data contract.
R2 – One department can have more than one user.
R3 – One publication can have more than one data contract.
R4 – Only one view can exist from one data contract.
ReturnInterDepartmentalDataFromSAPStoHomeAffairs()
ReturnInterDepartmentalDataFromHomeAffairs()
ReturnInterDepartmentalDataFromHomeAffairstoSAPS()
InterDepartmentalDataRequestfromSAPS()
InterDepartmentalDataRequestFromHomeAffairs()
ReturnInterDepartmentalDataFromSAPStoHomeAffairs()
54
R5 – One department can have more than one publication.
Figure 3.5: Data sharing gateway – UML meta model
3.3.6 Use Case Diagram for the DIG System
The relationship between the actors, functionality and the boundaries of the DIG prototype
system are shown by use cases. Escalona and Koch (2004) state that use case diagrams show
visually the functionality of the DIG prototype system. The use case diagrams of a system
and the relationship between the entities provides a great understanding of the system. The
high level functional requirements needed for the system as expected by the user can be
derived from the use case diagram. Figure 3.6 represents the use case diagram for the DIG
system.
55
Figure 3.6: Use case diagram for the DIG system
The functional requirements shown in Figure 3.6 have to be prototyped at this stage
using the DSR method. The users of the prototype and their roles (Salunke et al. 2013) are
shown in Table 3.1 and the main functions of the DIG system prototype are represented in
Table 3.2.
Table 3.1: Role and responsibility of the users
User Role and Responsibility
DIG System Administrator Data Contract Authorizer. This user is the overall
administrator of the system.
Department Administrator Data Contract Manger. This user created the data
contract of his department.
Data Contract Viewer Data Contract Visualizer. This user is the end user
who accesses the data contract as defined by the
system.
DIG System
Boundary
56
Table 3.2: Functions needed for the prototype development
Function Description
Manage Users This function created users who can access the system. The sub
functions like locking the user, changing password and setting up
the expiry of the logins forms the part of this function.
Define Department This function creates departments that wish to participate in the
information sharing using the system.
Manage Database Types and Connection
strings
This function defines the database type and the connection string
needed by the system. The database types in each department may
be diverse that the system should support.
View Data Contract This function allows the authorised users to view the defined data
contract across the government departments.
Approve/Disapprove Published Data
Contract
This function allows the DIG system administrator to approve or
disapprove the data contracts. Only the approved data contract can
be accessed by the authorized users.
View Audit Log This function enables the DIG system administrator to view the
activities done on the system.
The specification documentation involves the conversion of the UML use case
diagrams showed in Figure 3.6 into a prototype system. The prototype system for data
sharing across government departments requires the implementation of these specifications,
which must be then be coded to realise the DIG system (Satzinger et al. 2004). Figure 3.5
represents the UML class diagram (meta model) for the DIG system, which is the static
structure of classes and the relationship between them such as association, inheritance,
aggression and dependency.
3.3.7 Hippocratic Model on which the research is premised
Padma et al. (2009) demonstrated a Hippocratic postgreSQL architecture, which used an
extended SQL command along with the privacy facilities from both a terminal-based
interface and a web-based healthcare application. The Hippocratic postgreSQL architecture is
based on three key principles which are:
a) Privacy Policy Management – This feature requires extending the primary table with
an additional attribute that specifies the current policy associated with each data
owner.
b) Integrated Limited Disclosure – This feature ensures that any database access
complies with the active privacy policies stored in the ‘Privacy policy metadata’
tables and the owner preferences.
c) Integrated Limited Retention: This feature allows the data to be retained only as long
as necessary for the fulfillment of the purposes for which it was collected.
57
The DIG web application implements these key principles of the Hippocratic postgreSQL
model in the core data sharing engine to successfully enable secure data sharing across the
government departments using data contracts.
3.3.8 Prototype Evaluation
For the DSR study, the evaluation phase allows for testing Fan and Zhang (of the efficacy of
the soft DSR artefact in addressing the problem in the context in which it was established
(Crépin et al. 2008). The evaluation criteria and the limitation of the evaluation of the DIG
system is described in the evaluation phase in Chapter 4 of this dissertation. The relevance
and merits of the DIG system that will help seamless data sharing between government
departments is proved by the evaluation results. The stress is on demonstrating that the DSR
and this research study will produce a purposeful DIG system and a useful framework that
could solve real life problems in real situations (Wang and Hou 2010).
3.3.9 Dissemination
The dissemination phase focuses on communicating the extent to which the implementation
of the DIG system has addressed the research problem. The research problem is the entry
point, therefore the results of the research should clearly communicate if the research
problem was solved and the research objectives fulfilled. Additionally, the contributions of
the DSR artefact as it relates to the DIG system will be communicated to the relevant
knowledge domains. DSR not only focuses on producing innovative systems, but also on how
these systems will benefit those who will use them (Wang and Hou 2010). Hence the research
study should clearly provide contributions and disseminate them accordingly (Crépin et al.
2008). The research results, its contribution and the scope for further study are discussed in
Chapter 5.
3.9 Limitations
The popularity of the DSR research paradigm compared to other research paradigms in
information systems is low, but it is a valuable approach in information systems research.
Sahraoui (2007) states that there has been a slow adaptation and distribution of DSR in the
information system discipline in the last 15 years. The existing knowledge may be inadequate
58
for design purposes and therefore can force software designers to depend on intuition,
experience and experimentation approaches (Hevner et al 2004; Ellis and Levy 2010) to
produce innovative artefacts. This is why this study augments DSR with modelling tools and
languages such as UML and OCL. According to Crépin et al. (2008) one of the major
challenges of DSR is the overemphasis on the technological artefacts with the failure to
preserve an adequate theory base. These results are well-made artefacts that are not useful in
real life. Other challenges are related to the DSR solving a particular problem and applicable
only in the context of that problem (Hevner and Chatterjee 2010). For example, a model that
solves a particular problem in large organization may not necessarily be applicable to address
similar programs in small unstructured organizations (Juell-Skielse and Perjons 2009).
In this research study, the research method was a synergy between the DSR paradigm
and guidance from theoretical practices such as problem based research and contextual
research to get an in depth knowledge of the problem domain and setting of the intended DIG
system. This study does not justify the role of DSR in information system research, but
merely adopted it to shape the research study to produce reliable results and to follow an
accepted research method that involved thoroughness in the development and evaluation of
the DIG system. The lightweight web application framework could be criticized as a product
of software development exercise because both DSR and software development produces
software artefacts. The DSR process requires the use of rigorous accepted methods,
empirically testing of the artefact and communicating the results to contribute to the body of
knowledge (Sahraoui 2007; Crépin et al. 2008).
59
CHAPTER 4: PROTOTYPE SYSTEM EVALUATION
This chapter presents the prototype system evaluation of the Data Integration Gateway (DIG)
following design science research and Hippocratic database principles. The DIG application
facilitates seamless data sharing across different departments. The integration process pulls
data from different sources defined by data sharing contracts into a coherent view delivered
to the recipient. The purpose of conducting the DIG prototype system evaluation is to
legitimize the concrete idea behind its proposal. The DIG application proposes a central web
application framework that is accessible to different government departments that wish to
participate in data sharing collaboration. The prototype application is compatible with
different browsers and when invoked it connects to the backend database server that hosts the
DIG database. In addition, the DIG application offers the definition of data contracts that
apply the Hippocratic principles before data sharing can occur. The proposed approach for
data sharing between government departments takes place in real-time, whereas currently the
processing time of data requests by government departments can be anywhere from a few
hours to a few days depending on the transaction.
The implementation of the different components of the DIG application is discussed
in order to provide a clear view of the system evaluation task. This will be followed by the
introduction of the evaluation procedure, the presentation of evaluation metrics and
information on the evaluators. Simple scenarios are used to illustrate the efficacy of the
application. The evaluation covers the functions needed to seamlessly share data amongst the
government departments in a secure way using Hippocratic principles to enforce security
policies.
4.1 Prototype Implementation
This section presents the discussion on the implementation of the web application framework
called DIG in order to provide a proof of concept through a real life prototype system
implementation. The prototype system in action demonstrates the relevance of data sharing in
the e-government space. The prime goal of this research was to develop a central lightweight
web application framework for enabling seamless data sharing amongst government
departments in order to speed up the service delivery process. The varied functions provided
60
by the DIG application could be used by different government departments and can be
coherently integrated into their service delivery process. If any service is dependent on data
from any other government department, the DIG application can pull the data from that
source in real time. This mechanism reduces the time waiting to get the needed information
from other departments, which in turn speeds up the service delivery process of government.
The DIG prototype system provides the related management functionalities such as
managing user login, database connection, defining department, data contract, data contract
authorization and data contract visualization. The DIG application merely serves as a channel
for exchanging data reliably between government departments. An inherent merit of the
application is that no data from government departments are stored anywhere in the DIG
application. The DIG application only stores the authorized user and data contract
information for accounting purpose. Another potential merit of the prototype system is that it
is relatively easy to use and it accommodates basic users with low literacy levels. Users can
easily view the data exchanged using the data visualization function and skilled users who
can manage the data contract and other administrative functions can find the system
appealing.
The design of the prototype system took into cognisance the context of the working
environment of government departments, data ownership, data security, and hardware
infrastructure and software technology constraints. The system aims to improve efficiency in
delivering government services, foster accountability, minimize duplication of data across
government departments and promote openness and transparency in government departments
when it comes to efficient service delivery process. The implementation of the DIG
application is through the design science approach, incorporating Hippocratic database
principles to enforce data security. The application is cloud enabled because its database
server resides on the cloud to be able to hold huge volumes of data as often experienced in
government space.
Cloud computing has been defined as the aggregation of computing utility and
software services located in data centres offsite where the applications are delivered over the
internet as needed (Fernando et al. 2013). Cloud computing is the latest computing paradigm
that adds capabilities to conventional computer without the need of investing in new
hardware or infrastructure, licensing a new software, or having to train the system user.
Cloud computing provides shared online business applications that can be accessed using a
web browser or any other client devices, that runs the software and data stored on the shared
web/database servers. Cloud computing extends the functionalities of web applications into
61
services. A web application is a distributed client-server system. The web application uses, a
web browser which provides the user interface. The server and client exchange messages
using the HTTP/HTPPS request and response protocols (Rewatkar and Lanjewar 2010).
In this study the front-end of the DIG application was implemented using the
Microsoft Silverlight technology and framework for Windows Communication Foundation
(WCF) (MicrosoftDeveloperNetwork 2014a; MicrosoftDeveloperNetwork. 2014b). The
Silverlight technology is a cross-platform, cross-device and cross-browser plugin technology
for providing the next generation of “.NET” framework based rich interactive and user
experiences applications for the Web (LI et al. 2009). The WCF is Microsoft’s unified
computer programming model for creating and building a rapid service oriented applications
(McMurtry et al. 2006; Skonnard 2006). The back-end database was implemented using the
Microsoft Structured Query Language Compact Edition (SQL CE) lightweight database
technology. Microsoft SQL CE is a database engine designed for mobile and embedded
applications that run efficiently and that require less resources (Seshadri and Garrett 2000).
In the DIG application, the mechanism for sending and receiving data from the server
to the client is handled through the WCF services. The applications, build with WCF can
communicate across the web and the enterprise applications (Meier et al. 2009). The WCF is
the layer between the Silverlight client application and the SQL CE database server (Kamran
and Haas 2011). The WCF service works asynchronously and supports all type of protocols,
namely named pipes, Microsoft Message Queuing (MSMQ), http/https, Transmission Control
Protocol (TCP) and it can be hosted on self-hosting applications, Internet Information Server
(IIS) and Windows Application Service (WAS). As already emphasised, the definition of the
data contract defined in the DIG system does not store any data from government
departments. The data contract only stores the necessary information to fetch the data from
the publisher and seamlessly transport the data to the subscriber and the necessary security as
well as connection information. So the lightweight SQL CE database with the WCF services
fits in appropriately as technologies that can handle the data contract needed by the DIG
system.
4.2 Evaluation Components
This section provides a description of the components of the DIG application that were
evaluated in this study following the DSR approach. The DSR evaluation process focuses on
the validity of a system in regard to changing the user requirements to preferred states. The
62
DIG application may be deemed inappropriate when it does not present any real value for
practical usage. However, the application may be regarded as complete and effective when it
satisfies the intended requirements within the constraints of the problem being solved. The
DSR evaluation process can be carried out in two main forms, namely, a naturalist and an
artificial setting evaluation (Olugbara and Ndhlovu 2014). An artificial evaluation is
conducted in a non-realistic setting and uses methods such as laboratory experiments and
simulations (Baskerville et al. 2009). A laboratory evaluation allows for more control over
the testing scheme and reduces the costs of experimentation. However, it lacks the
pragmatism of user interaction because it does not simulate the real context of users and lacks
the desired ecological validity of user settings (Kallio and Kaikkonen 2005). A naturalistic
evaluation involves observing the performance of a system in a real user setting and engages
the actual users in identifying real system problems.
The literature posits that a system can be evaluated from an ex-ante and/or ex-post
perspective. An ex-ante perspective means system evaluation prior to implementation and ex-
post perspectives means system evaluation after implementation (Baskerville et al. 2009).
Evaluation of the DIG application follows an ex-post naturalist pattern, using DSR principles
to explore how real users react to the application in a natural context (Helfert and Donnellan,
2012). By considering all the above arguments, the DIG application was evaluated by
observing its actual operation in a field experiment. This approach allowed for the acceptance
of all the complexities of human behaviour in real life settings, against specified evaluation
methods and realistic expectations (Baskerville et al. 2009). The choice of the right
evaluation method was critical for research of this nature and was influenced by the fact that
real users are from varied contextual backgrounds and settings. This made it, therefore,
imperative to establish the validity of the evaluation in a user context (Cleven et al. 2009).
The ex-post naturalist evaluation was conducted on the basis of different system components.
A component wise evaluation offers an advantage over a whole system evaluation because it
allows each important aspect of the application to be fully comprehended and validated
against its functional requirements. The “.net” framework and the Silverlight design patterns
(El-Bakry and Mastorakis 2009) helped to provide simple and easily accessible system
component workflows.-
63
4.2.1 Manage Login
The DIG system requires users from participating departments to register with user names
and passwords for authentication purposes. A user authentication is required for the DIG
system users to gain access for using the application on their web browsers as shown in
Figure 4.1. This is the fundamental requirement of most web applications to allow user access
by authorization. The application will then authenticate the user and load the main interface
of the application to allow the department user to perform specific data integration
transactions such as viewing or defining a data contract. The system allows the user to
complete as many transactions as possible without delays and deviation from transactions to
enable data integration.
Figure 4.1: “DIG Login” screen
The user with a data contract authorization role can manage the logins for the DIG
application. It is possible to use the “Manage Login” component to “Create Login”, “Edit
Login” and “Delete Login” for a user as shown in Figure 4.2. This figure portrays the main
components of the DIG application such as “Manage Login”, “Define Department”, “Manage
Connection Strings”, “Authorise Contract” and “View Audit Log”.
64
Figure 4.2: “Manage Login” screen
The “Create Login” or “Edit Login” components pop up a similar screen that allows
for the required input to be captured and saved. The required inputs such as user name, secret
password, expiry date for the login to the DIG system, the user role, email address and
department that are required areas are shown in Figure 4.3.
Figure 4.3: “Create Login” or “Edit Login” screens are similar to each other
65
4.2.2 Define Department
The administrator can “Create Department”, “Edit Department” and “Delete Department”
according to the departments that wish to participate in the data sharing collaboration using
the DIG system. The information such as department ID (unique identifier for a department),
department name, department function and location are captured and stored in the DIG
application as shown in Figure 4.4.
Figure 4.4: “Define Department” screen
The department’s system administrator can edit the department details that are defined
by the DIG system administrator if needed. The “Define Department” component also allows
the department administrator to publish the data contracts for the department using the
“Create Publication” functionality as shown in Figure 4.5.
66
Figure 4.5: “Create Department” screen
The department system administrator can create the data contract and publish it to
facilitate data sharing transactions using the “Create Publication” functionality as shown in
Figure 4.5. This functionality allows the administrator to test the connection using the “Test
Connection” function and to verify the validity of the publication before publishing it to the
DIG system. The preview of the data that will be shared is also supported using the “Data
Preview” function. The DIG system will enable the “Data Preview” when the test connection
verifies the connection for valid publication data, as shown in Figure 4.6.
67
Figure 4.6: “Create Publication” contract screen
The “View Data contract information” functionality of the “Define Department”
component of DIG application is accessible to “Data Contract Manager” role specified by the
system. If the user has only “Data Contract Visualizer” role then the user can access the
“View Data Contract Information” screen only. This screen shows all the data contracts
approved by the DIG system administrator and to the data contracts to which the Data
Contract Visualizer” role has access to as shown in Figure 4.7.
68
Figure 4.7: “View Data Contract Information” screen
Selecting the data contract and then clicking on the “View Data” button brings up the
data contract preview screen shown in Figure 4.8. The “View Data Contracts” screen has a
print preview tab where you can preview the data before printing. This screen also has a data
filter text box where data can be filtered before printing.
69
Figure 4.8: “View Data” screen
4.2.3 Manage Connection String
The user with the role of “Data Contract Authoriser” who is the DIG system administrator of
the DIG system can define the type of databases that the DIG system can support (Figure 4.9)
along with its corresponding connection strings (Figure 4.10). The connecting string formats
will be later used when defining the data contracts by the department system administrator.
70
Figure 4.9: “Manage Connection String” screen
Figure 4.10: “Create Connection String” screen
4.2.4 Authorise Contract
The DIG system administrator can “Approve” or “DisApprove” the published data contracts
by the department administrator using authorise contract functionality. Only the approved
data contracts will be visible to the users with the “Data Contract Visualiser” role. This
mechanism enforces security control at multiple levels, including who has access to create
data contracts and who has access to approve the sharing of the published data contracts.
Figure 4.11 shows the data contract authorisation screen.
71
Figure 4.11: “Authorise Contract” screen
4.2.5 View Audit Log
The DIG system administrator can check the activities on the DIG system using the “View
Audit Log” function as shown in Figure 4.12.
72
Figure 4.12: “View Audit Log” screen
The DIG system administrator can also search for a specific audit log using the
“Search Audit Log” function. This function allows the DIG system administrator to search
for a date range or for a specific text value as shown in Figure 4.13.
Figure 4.13: “Search Audit Log” screen
73
4.3 Evaluation Constructs
The evaluation of the performance of the DIG application is based on user interaction and
system usability constructs, which are two important measures for system evaluation
(Harrison et al. 2013; Olugbara et al. 2010; Zaharias and Poylymenakou 2009; Johnson and
Yang 2009; Theofanos and Scholtz 2005; Scholtz and Consolvo 2004). Interaction is defined
as how evaluators and systems function cooperatively taking into account that devices in the
computing environment can be more dynamic than static (Scholtz and Consolvo 2004).
Usability is the level to which a system can be used by users to achieve the needed goals with
satisfaction , efficiency and effectiveness in a definite context of use (Nayebi et al. 2012).
The success of application of the DIG system focuses on the overall user experience during
the interactions and evaluations.
The ability of the system evaluators to correctly respond to the measurable statements
was measured using a five-point Likert scale. A response score of 5 indicates “strongly
agree”, and a response score 1 indicates “strongly disagree”. An average response score of 2
indicates “disagree”, a response score of 3 indicates “somewhat agree” and a response score
of 4 indicates “agree”. Table 4.1 shows the constructs with their corresponding evaluation
statements or measures.
74
Table 4.1: DIG system evaluation constructs and statements
N
o.
Description of Interaction Statement
M
01
I am able to access the system only when my details are correctly specified.
M
02
I am allowed to log into the system with password validations and the system logs me out after the task
is complete, if I do not explicitly log out.
M
03
Only the Users that have been authorised can access the published in for.
M
04
The system speed and response to fetch the data contract data is satisfactory.
M
05
The system responded to the specified login authorization and the data contracts linked to the user and
department.
M
06
The system exposes only the published data based on the available and restricted data fields from the
data source.
M
07
Auditing is enabled for monitoring, in compliance with Hippocratic principles and privacy policies
covering security and privacy.
M
08
The system tracks all the accessed data for what purpose and by whom, the time of access and the
changes made.
Description of Usability Statement
M
09
I understand the information required of me to access the system.
M
10
The system maintaining my privacy preferences.
M
11
The system only publishes only the information that I allow.
M
12
The system allows the publishing of my information only when authorised.
M
13
Once the data content is published, the data contract cannot be altered. Data contract belongs to the
Data contract authorizer.
M
14
Only the non-restrictive data items can be used for Data contracts.
M
15
The system enables the linking privacy laws using Hippocratic principles and regulations relating to a
data contract and its data items based on the logins.
M
16
The system runs on all popular internet browsers including Internet Explorer, Chrome, Firefox, and
Opera.
4.4 System Evaluators
This study used 16 system evaluators as hosting the system in the ‘cloud’ and the time of the
professional testers had a cost implication. The 16 evaluators used the DIG system on
different browsers with preloaded data bundles. Table 4.2 reveals the distribution of the
system evaluators, who were all professional testers from a software development company
in Durban, South Africa. The system evaluators were trained to acquaint themselves with the
basic functions of the DIG system. It was easy to communicate the functionalities of the DIF
application to the evaluators because of their experience working with web applications. The
system evaluators were specifically instructed to perform the following basic tasks using the
DIG application:
a) Manage database types of connection strings.
75
b) Publish a data contract.
c) View a data contract.
d) Manage users.
e) Define departments.
f) Approve or disapprove published data contracts.
g) View audit log.
Table 4.2: Distribution of system evaluators
Title Years of Experience No. of Testers
Test Analyst 8-10 4
Senior Testers 6-8 6
Testers level 1 and 2 4-6 6
4.5 Evaluation Procedure
The evaluation of a software system is the set of activities used to determine if the system
under examination meets the design requirements and to verify if the performance of the
system satisfies the usability needs of the end users. While it is important in the application of
DSR methodology to prove the usefulness of a system, a rigorous DSR evaluation procedure
requires justifying the evaluation settings and validating the system design before it is put to
practical use (Sonnenberg and vom Brocke 2012). Karmokar et al. (2013) proposed a user-
centred procedure in design science research based on the Pries-Heje et al. (2008) conceptual
framework and applied the procedure for the evaluation of a website. The evaluation
procedure begins by asking some pertinent self-report measures that afford the evaluators the
opportunity for deeper cogitation. Moreover, self-report measures are the valid and cost
effective ways to collect information from the people (Glasgow et al. 2005). The self-report
measures for the evaluation of the DIG application as suggested by Karmokar et al. (2013)
and Pries-Heje et al. (2008) are the following:
a) What is being evaluated? In the case of this study, it is the data integration gateway
design product.
b) How is it being evaluated? In the case of this study, it is through laboratory
experiments.
c) When is it being evaluated? In the case of this study, it is ex-post naturalist using
software professionals to voice their opinions about the system.
d) Who is evaluating it? In the case of this study, the evaluators are professional
software testers and analysts.
76
The most critical response to these four evaluation measures or questions is the how
question (Karmokar et al. (2013). The DIG system was evaluated using two methods, which
are user task analysis and unit testing as shown in Table 4.3. This follows the
recommendation in the literature to use multiple methods to evaluate a system (Karmokar et
al. 2013). The user task analysis was used to evaluate interactivity and usability of the DIG
system. The interaction evaluation was aimed at exploring the extent to which the DIG
system provided the required feedbacks to users to successfully complete the intended data
integration transactions without much rigour. The system usability is aimed at creating a
system such as the DIG to ensure that it is usable with low learning overhead. The system
evaluators were asked to express their opinion on the interactivity and usability of the DIG
system using the data collection instrument in Table 4.1.
Table 4.3: Evaluation Methods Used in this Study
Evaluation Method Goal of Evaluation
User Task Analysis To test the human interaction, usability and functionality of the DIG system.
Unit Testing
To test the functionality, quality and code coverage at a component level. This is
crucial as not all the code within the system can be evaluated with the usability
test. The code related bugs can be easily identified by unit testing.
The DIG system was evaluated for quality and fulfilment of the system requirements
using the software automated testing procedure. Sang et al. (2009) state that to test if the
implemented software and its functionalities fit into the specification requirements as drafted
by the analyst or the system innovator (the researcher in this case), a validation process is a
mandatory task. The process of validation is an important step that must be a part of the unit
test case design. For systems based on object oriented design, the process of validation is
particularly germane. Khan et al. (2010) and Benli et al. (2012) argue that to test software
requires a lot of resources including manpower and equipment, therefore this study
implemented a unit testing procedure with the aid of NUnit tool in Microsoft Visual Studio to
speed up the testing process. Tillmann et al. (2010) states that unit testing is an important and
valuable means of improving software reliability and in recent years, it’s been widely
recognized in the industry, as it exposes bugs early in the software development life cycle. It
is necessary to test all the individual software components separately instead of a whole
system to make testing more robust and scalable. Wahid and Almalaise (2011) state that
when it comes to testing procedures, unit testing plays a major role to test the source code to
find out if it is fit for use and to confirm that the code fulfills its design and behaves as
anticipated. Hwang et al. (2004) posit that unit testing has become so obvious and essential in
77
today’s software development that there exist a number of software development frameworks
to aid unit test writing, maintaining and running computer codes.
4.6 Evaluation Results
The empirical results of the prototype DIG system evaluation, using descriptive statistics
were based on the findings of user task analysis (interaction testing and usability testing) and
unit testing. The user task analysis questionnaire was formulated for the DIG application
based on the key evaluation criteria shown in Table 4.1. is the results are presented in Figure
4.14, showing the mean of response measures against the 16 evaluation measures for the
extent of interactivity and usability provided by the DIG system. In Figure 4.14 the usability
testing results are plotted on the positive vertical axis, while the interaction testing results are
plotted on the negative vertical axis for easy interpretation. A similar reporting approach for
usability testing experiments was used in the usability analysis of a mobile recommender
system (Olugbara et al. 2010). The user interaction analysis results show a consistent increase
in all responses with a minimum mean value of 3.200 (standard deviation of 0.696) and
maximum mean value of 3.930 (standard deviation of 0.463).
This result generally means that evaluators responded above the mean score of 2.5 on
the measurement scale. The minimum mean value for user interaction occurred for measure
M02, which is the user interaction for logging into the DIG system. The maximum mean
value of 3.93 occurred for the statement M04 for the DIG system to fetch and return the data
based on the user’s request for viewing the data contract. This result means that evaluators
found the process of data request contract and viewing as implemented by DIG more
interactive and that of “log in” to be less interactive. This result was expected as users are
more familiar with the “log in” system for most web applications. The result of the DIG
system usability also shows a consistent increase above the mean score of 2.50 on the
measurement scale. The minimum value of 3.270 (standard deviation of 0.600) for measure
M11, which is the measure for the DIG system allowing only the information that the
administrator allowed for publishing. The maximum value of 3.880 (standard deviation of
0.517) was recorded for the M09 measure, which means that the DIG system users
understand the required information to access the system, hence it is usable.
78
Figure 4.14: Mean of user interaction and system usability measurements
The unit testing evaluation of the DIG system was carried out using the unit testing
mechanism implemented in the Microsoft NUnit. Tillmann et al. (2010) state that unit testing
has been widely recognized as a valuable means of improving software reliability, as it
exposes bugs early in the software development life cycle. Moreover, it is desirable to test
individual software components in isolation to make the overall system more robust and
scalable. Benli et al. (2012) points out that software testing is generally an expensive, ad hoc
and unpredictable process, which requires a better process. Performing unit testing can help
minimize the expensiveness of a testing procedure as it becomes simpler to manage short
codes than to manage bulky ones. Wahid and Almalaise (2011) state that unit testing plays
significant role in testing procedure to determine if the source code is fit for use to ensure that
code meets its design and behaves as intended. Hwang et al. (2004) mention that unit testing
has become so evident and crucial in today’s software development that there are a number of
unit testing frameworks to assistance unit test creation, maintaining and for execution.
The researcher chose to apply the NUnit unit testing framework which is well
recognized in the developer community and software industry. There are other competing
unit testing frameworks in existence such as MS Test and JUnit, but NUnit was used since it
is recommended for Microsoft c# language “.Net” framework and the researcher is
conversant with it. Figure 4.15 shows the results of the unit testing experiment with the DIG
system. The results show that all the test cases related to the components within the DIG
system passed the litmus test successfully. The unit testing was conducted for both success
and failure criteria such as invalid passwords. The unit test ran through all the codes in the
79
DIG system and discovered any bugs buried in the code. The execution time of the
components in the DIG system is also shown in Figure 4.15. The average timing for
execution of the code was 588 milli seconds, which reveals that the DIG system is robust and
error free.
Figure 4.15: DIG application evaluation using unit tests with passed test case
80
CHAPTER 5: DISCUSSION AND CONCLUSIONS
This chapter discusses the summary of findings of this study with respect to the development
of a data integration gateway that can help facilitate data sharing. The discussion of the study
findings also covers reflections on the lessons learnt through the research process. In
addition, the chapter summarizes the study benefits and suggests recommendations for future
work. The suggested recommendations are based on the outcomes of the experience of
implementing the DIG system and the design science based evaluation of the implemented
system. The chapter concludes by highlighting the reflections and lessons learnt by the
researcher throughout the diverse stages of the study.
5.1 Summary of the Study
This study explored data sharing as an e-service within the e-government domain in the
context of the South Africa system. Previous authors have seen e-service as a core component
of the e-government system delivered through the internet because it bridges the intrinsic gap
between the government administrators and citizens (Kaaya 2004; Misuraca et. al. 2011). The
overarching goal of this study was to develop a web application that is based on Hippocratic
database principles to support seamless sharing of data in e-government space. The research
objectives have been met in order to achieve the goal of this study:
a) To enable seamless data sharing across diverse government departments without any
changes to the existing system infrastructure.
This objective was met through the development and evaluation of a data integration
gateway (DIG) that could facilitate seamless data sharing without additional costs to
the existing infrastructure. The DIG is able to integrate data from diverse sources and
deliver the result to the requester that have been permitted by contract agreement to
access parts of the data.
b) To control the volume of data sharing more securely across government departments
using a coherent contract management technique implemented according to
Hippocratic database principles.
This objective was realized through the contract management policy implemented in
the DIG system that was developed in this study. The gateway is able to restrict data
81
sharing to parts that are specified by the contract agreement policy. This implies that it
is not essential to transport the entire database or data file across the network for the
specific sub-data requested.
c) To reduce the time delay often experienced during cross verification of data involved
in government services.
This objective was met because data requested from one government department can
be automatically shared using the DIG system for the departments that are involved in
the data contract agreement. If data are automatically accessed from the sources
without intermediary, it is possible to improve the processing time that will eventually
improve service delivery efficiency.
d) To maintain a high level of consistency when data are shared across government
departments.
This objective was met because using the DIG system, multiple data entries at
different sources can be avoided. The department that hosts a particular database can
share it with other departments participating in the data sharing contract agreement.
e) To eliminate the storage of duplicate data across government departments by sharing
the data from the source of truth.
This objective was intrinsically met because DIG system eliminates the need to keep
multiple sources of truth. If a database resides in a particular department, its contents
can be effectively and efficiently shared across all other departments that agree to
participate in the data sharing collaboration.
The DIG could be touted as a data sharing tool that could contribute to effective
means of achieving data interoperability within the e-government space. Previous authors
have mentioned that data sharing in government space will contribute to eliminating errors
inherent from manual procedures, and eliminate duplication of data thereby decreasing the
time needed for transactions (Ndou (2004). Efficiency is also achieved by streamlining the
internal process by enabling more informed and faster decision making and by speeding up
transaction procession. Gianluca et al. (2011) argue that there are still challenges with the
interoperability dimension of governance openness within e-government space and propose
that interoperability contributes a lot to the delivery of e-government services to local and
national organizations within the European Union. Solving data interoperability problems
adequately will allow any two or more organisations or departments to exchange and
understand information where there are hardware and software issues (Guijarro 2007). This
will also allow two or more organisations or departments to exchange data where the
82
structure and content of the exchanged data are different, but the information is correctly
traded (Gugliotta et al. 2005). In codicil, it will allow two or more organisations or
departments to engage in an effective exchange of information, data and services through the
adoption of best practices supported by an appropriate framework (Scholl and Klischewski
2007).
5.2 Benefits of Data Integration Gateway
The data integration gateway (DIG) is a web based system that enables seamless data sharing
across government departments by providing data contracts in place and by enforcing
security standards for defining and sharing data. The DIG system can work with any type of
the existing relational databases and is compatible across any web browser. The DIG system
works on user based and role based authentication mechanisms. The communication across
government departments are through secure protocols. The web application and the database
that hold the data contracts and connection information reside at the secure government data
centre. The DIG system administrator can track the activities that are taking place in the DIG
system. The published data contracts are transparent and once published, all the authorised
users can access the data contracts. The DIG system connects the vertically integrated system
horizontally.
This in turn breaks the existing barriers where communication between vertically
integrated systems is not possible. As a result, intra- and inter-department communications
are made easy using the DIG system. There is efficient delivery of services where there is
inter-dependency between the departments. The DIG system can integrate existing
applications and databases in government departments and enables communication between
them making the practicality of seamless data sharing a reality. This implies that no changes
to the existing infrastructure in government departments are needed. A very low investment is
needed to host the DIG system at the data centre. Making the service delivery faster by
enabling data sharing between government departments encourages citizens to trust the
government. The DIG system eliminates the duplication and inconsistency of data across
government departments which also creates trust between government and citizens. The top
officials in the government are already under pressure for slow delivery of government
services. With a system such as the DIG that is efficient, robust and cost effective, the
support from the top management should be easily obtained.
83
The DIG system addresses the service delivery issues faced by the South African
government to reach their vision of e-government 2020. To fulfil the vision of South African
government’s e-government 2020, which is to bring the existing manual services online
through web and internet, data sharing across government departments must be in place first.
Secondly, a massive change in existing hardware infrastructure and software systems in the
government space needs to occur to provide the latest internet technologies to support the
online web services that can support the South African government’s vision of e-government
2020. The DIG system is cross-platform, cross-browser and can support most of the different
types of databases used in the government sector, thereby promoting technological
interoperability. The DIG system can support most of the different types of databases used in
the government sector. When the data contract is properly defined and transformed,
information can be correctly exchanged between diverse government departments. The
process and procedure to exchange data or information between government departments are
clearly supported by the functions implemented in the DIG system. The interoperability
provided by the DIG system allows any number of government departments to participate in
the data or information sharing to enable more effective intra- and inter-departmental
communication.
The development of the DIG system was based on the design science research
hypothesis, which seek out to increase the limits of organizational and human competencies
by generating new, innovative and purposeful systems. The contributions of design science
research are in the collective innovation and usefulness of the developed systems that enable
the understanding and creation of useful information systems in the organizations (Hevner et
al. 2004). The contributions of the systems are valued with respect to their capability to
increase performance in the growth and use of information systems (March and Storey,
2008). The DIG system developed and reported in this dissertation contributes to design
science research as well as the ICT knowledge domain and satisfies the following
requirements:
a) Convenient – the language based on contract management policy was borrowed from
Hippocratic database principles for specifying data of interest is intuitive, simple and
user friendly.
b) Preservation – enforcing data privacy policies through a set of contract agreement
policies do not require any changes to the existing database systems managing the
source databases.
84
c) Persistency – data privacy policies are created, managed and stored as contracts in an
external database that is private to the gateway.
d) Protection – contents of source databases are not altered, no data write access given to
the gateway and data read by the gateway from the source databases are not stored in
the database maintained by the gateway, but such data are delivered to the requesters
as portable files.
The potency of the Hippocratic data sharing approach being proposed in this study is
built on two technical properties. Primarily it supports field and record level data privacy
enforcement policies. Next, it permits full use of the standard structured query language
(SQL) query proficiencies to express policies for seamless data sharing. In more detail, the
contributions of the research reported in this dissertation are:
a) The investigation of an approach for a seamless Hippocratic sharing of data
maintained by different heterogeneous information systems with specific reference to
the e-government space.
b) The examination of several implementation issues of a seamless Hippocratic data
sharing technique, including secure metadata storage, efficient query formulation
policies and data structure for the storage of contract information.
c) The experimental evaluation of the proposed application shows that the data sharing
approach has low overhead and speeds up data sharing and information verification
time.
The DIG system therefore presents a potential framework to solve some of the
existing challenges of disconnected government systems which exist in most developing
countries. The DIG system provides the envisaged benefits for the government which are
enunciated as follows:
a) Enables seamless data sharing across diverse government departments without any
changes to the existing infrastructure and software applications.
b) Controls the volume of information sharing more securely using data contracts with
Hippocratic principles among diverse government departments.
c) Reduces the time delay and the dependencies across government departments during
cross verification of data involved in government services.
d) Maintains a high level of consistency when data are shared across government
departments.
e) Eliminates the storage of duplicate data across government departments by sharing the
data from the source of truth.
85
f) Delivers services at acceptable speeds.
g) Aligns government’s political and delivery mandates using technology.
h) Develops and implements immediate and interim measures to support and secure the
IT environment of the government.
5.3 Future Work
Implementation of the DIG system would provide a methodology and foundation upon which
to apply design science research to improve data sharing in innovative ways and thereby
improve the efficiency of service delivery in government departments. The evaluation of the
DIG system by means of this study anchors the validity and reliability of the criteria applied.
The DIG system could effectively contribute to millions of citizens and businesses in
developing countries by speeding up service delivery. This system is cost-effective to
implement and can support the existing infrastructure and databases in government
departments. The research results provide relevant insights to extend the concept of data
sharing in the government sector for future research and can be extended to apply data
contracts and Hippocratic principles for mobile cloud services. Ndou (2004) states that with
the rapid technological changes in ICT and availability of new technologies, government
sectors can create extensive opportunities to rethink the way that services are delivered in the
public and government sectors. Cost effective, robust, secure and freely available ICT
solutions can be developed to bring communication and collaboration between the
government, citizens and the businesses together. The pervasiveness of mobile devices means
that citizens demand new ways of conducting businesses and interacting with government
directly by using government services online.
Future work can look at mobile data sharing within the e-government space to support
the emerging open government initiative. The emergence of mobile phones, wireless
technologies and hand held devices with sophisticated features and powerful computing is
creating the demand for all governments to provide mobile, open and smart government.
Reffat (2003) raises an important point about the latest improvements in mobile and wireless
communications and states that it is becoming easier for the governments to provide and
manage services to its citizens efficiently and cost effectively using advanced solutions
through the mobile. The usage of internet using the mobile phones is increasing faster than
desktop usage and is likely to continue in this direction in the future. The next generation of
e-government services will mainly be consumed on mobile devices, so the government are
86
now forced to provide the e-government service via mobile which is referred to m-
government (Almarabeh and AbuAli 2010). To fulfil the mobile government requirements
and to support other hand held devices governments around the world must publicize and
make available government services using web/cloud services that are efficient, compatible,
secure, and interoperable so that the web services can be consumed by various third party
applications. The application of Hippocratic principles and the concept of the data contract
can also be applied to government web/cloud service architecture, requiring user
authentication for access to the web service. Future work can research issues regarding data
integration, sharing and interoperability for the smart government initiative.
5.4 Concluding Remarks
To conclude, this dissertation developed a data integration gateway based on Hippocratic
database design principles to facilitate seamless sharing of data across government
departments that wish to participate in collaborative data sharing. In this dissertation, the
necessity of data sharing is well documented and how this mechanism can help to improve
government service delivery process is detailed. Firstly, considering the importance of data
sharing as a way of improving service delivery in the government departments, this study can
conclude that in the case of the South African e-government implementation framework, the
need to have a system such as a data integration gateway in place to help facilitate service
delivery process is absolutely vital. Secondly, and most importantly, the need to control how
data should be shared within the e-government space to enforce security policy is critical to
the successful application of a data integration gateway. The interplay between accessibility
to crucial government information is associated with levels of data integration and sharing
that occur at government departments. This helps to explain how government departments in
South Africa could adopt ICT in their future data sharing collaboration. Thirdly, this study
presents evidence in line with previous studies that data sharing can be challenged through a
design science system construction.
This study emphasises that ICT development should be based on a clear
understanding of the existing problem, the real system requirements and the usefulness of the
solution being suggested. Innovative ideas must be developed into an ICT based artefact that
must then be adapted to solve the identified problem. The ICT artefact must be useful from
the viewpoint of the users for whom the solution was developed. This research study presents
the work and findings from user based evaluation of the DIG system for the government
87
sector. The relevant parties, literature and other sources that contributed toward the content of
this research, to the dissertation and personally to the researcher were acknowledged
accordingly throughout the dissertation document. Overall, embarking on this study brought a
challenging, but yet exciting experience for the researcher. The interaction with the various
stakeholders that contributed to the success of this research cannot be described in words.
The experience of interacting with real people, addressing real problems through design
science research was a very rewarding and a fulfilling experience. Although the research
study was conducted through a formal academic process, it provided an opportunity to learn
outside the conventional ICT systems development environment and management
environment through applying innovative research to solve a real world problem. The
insights gathered from this study can support informed arguments related to some of the
theories in the ICT domain. The proposed data integration gateway solution developed in this
study can benefit governments and private businesses and organizations that want to share
data across departments or organizations. The DIG framework therefore is a unique concept
that can be adopted by any sector, but for the government sector the framework can make a
massive difference in service delivery which will benefit citizens and businesses.
88
REFERENCES
Abodohoui, A., Mohiuddin, M., and Su, Z. 2014. E-Communication Adoption in
Benin Public Administration: Challenges and Strategies. International Journal of Business
and Management, 9(1): 43.
Agrawal, R., Kiernan, J., Srikant, R. and Xu, Y. 2002. Hippocratic databases. In:
Proceedings of Proceedings of the 28th international conference on Very Large Data Bases.
VLDB Endowment, 143-154.
Agarwal, V. (2012). Privacy and data protection laws in India. International Journal
of Liability and Scientific Enquiry, 5(3): 205-212.
Ager, T., Johnson, C. and Kiernan, J. 2006. Policy-based management and sharing of
sensitive information among government agencies. In: Proceedings of Military
Communications Conference, 2006. MILCOM 2006. IEEE. IEEE, 1-9
Almarabeh, T. and AbuAli, A. (2010). A general framework for e-government:
definition maturity challenges, opportunities, and success. European Journal of Scientific
Research, 39(1), 29-42.
Asogwa, B. E. 2013. Electronic government as a paradigm shift for efficient public
services: Opportunities and challenges for Nigerian government. Library Hi Tech, 31(1):
141-159.
Azemovic, J. 2012. Data privacy in SQL server based on Hippocratic database
principles The Microsoft MVP Award Program Blog. (Blog). Available:
http://blogs.msdn.com/b/mvpawardprogram/archive/2012/07/30/data-privacy-in-sql-server-
based-on-hippocratic-database-principles.aspx (Accessed 10 March 2013).
89
Baskerville, R., Pries-Heje, J. and Venable, J. 2009. Soft design science methodology.
In: Proceedings of proceedings of the 4th international conference on design science
research in information systems and technology. ACM, 9.
Bernat, Crocker and Farber. 2003. Four Grand Challenges in Trustworthy. Computing
Research Associations Available:
http://cra.org/uploads/documents/resources/rissues/trustworthy.computing_.pdf (Accessed 15
May 2014).
Benli, S., Habash, A., Herrmann, A., Loftis, T. and Simmonds, D. 2012. A
comparative evaluation of unit testing techniques on a mobile platform. In: Proceedings of
Information Technology: New Generations (ITNG), 2012 Ninth International Conference on.
IEEE, 263-268
Beynon-Davies, P. 2007. Models for e-government. Transforming government:
people, process and policy, 1(1): 7-28.
Bhattacharya, D., Gulla, U. and Gupta, M. 2012. E-service quality model for Indian
government portals: citizens' perspective. Journal of Enterprise Information Management,
25(3): 246-271.
Cabot, J., & Gogolla, M. (2012). Object constraint language (OCL): a definitive
guide. In Formal Methods for Model-Driven Engineering (pp. 58-90). Springer Berlin
Heidelberg.
Carroll, M., Van Der Merwe, A. and Kotze, P. 2011. Secure cloud computing:
Benefits, risks and controls. In: Proceedings of Information Security South Africa (ISSA),
2011. IEEE, 1-9.
Chaabane, E. K., Hadouaj, S. and Ghedira, K. 2013. Multi-agents coordination model
in inter-organizational workflow: applying in egovernment. International Science Index 73,
7(1): 365-372.
90
Chen, J., Yan, Y. and Mingins, C. 2011. A three-dimensional model for e-government
development with cases in China's regional e-government practice and experience. In:
Proceedings of Management of e-Commerce and e-Government (ICMeCG), 2011 Fifth
International Conference on. IEEE, 113-120.
Choi, J. J. U., Ae Chun, S., Kim, D. H., and Keromytis, A. 2013. SecureGov: secure
data sharing for government services. In Proceedings of the 14th Annual International
Conference on Digital Government Research (pp. 127-135). ACM.
Choudrie, J., Weerakkody, V. and Jones, S. 2005. Realising e-government in the UK:
rural and urban challenges. Journal of Enterprise Information Management, 18(5): 568-585.
Christi, A. 2012. Autocodecovergen: prototype of data driven unit test generation tool
that guarentees 100% code coverage for C#. Advanced Computing, 3(5): 73.
Chun, S. A., Luna-Reyes, L. F. and Sandoval-Almazán, R. 2012. Collaborative e-
government. Transforming Government: People, Process and Policy, 6(1): 5-12.
Chun, S. A., Shulman, S., Sandoval, R. and Hovy, E. 2010. Government 2.0: Making
connections between citizens, data and government. Information Polity, 15(1): 1-9.
Cleven, A., Gubler, P. and Hüner, K. M. 2009. Design alternatives for the evaluation
of design science research artifacts. In: Proceedings of Proceedings of the 4th International
Conference on Design Science Research in Information Systems and Technology. ACM, 19.
Computer Research Association. 2003. Four grand challenges in trustworthy
computing. Available:
http://cra.org/uploads/documents/resources/rissues/trustworthy.computing_.pdf (Accessed 15
May 2014).
Cordella, A. (2013). E-Government success: how to account for ICT, administrative
rationalization, and institutional change. In J Gil-Garcia (Ed.), E-government success factors
and measures: theories, concepts, and methodologies (pp. 40-51). Hershey, PA: Information
Science Reference.
91
Cowell, R. and Martin, S. 2003. The joy of joining up: modes of integrating the local
government modernisation agenda. Environment and Planning C, 21(2): 159-180.
Crépin, L., Vercouter, L., Jacquenet, F., Boissier, O. and Demazeau, Y.. 2008.
Hippocratic multi-agent systems. ICEIS (2)(pp. 301-307).
Davison, R. M., Wagner, C. and Ma, L. C. 2005. From government to e-government:
a transition model. Information Technology & People, 18(3): 280-299.
Dawes, S. S., Gharawi, M. A. and Burke, G. B. 2012. Transnational public sector
knowledge networks: Knowledge and information sharing in a multi-dimensional context.
Government Information Quarterly, 29: S112-S120.
De Jager, A. and Van Reijswoud, V. 2008. E-Governance in the developing world in
action. The Journal of Community Informatics, 4(2).
Debnath, N., Felice, L., Montejano, G. and Riesco, D. 2008. A feature model of e-
government systems integrated with formal specifications. In: Proceedings of Information
Technology: New Generations, 2008. ITNG 2008. Fifth International Conference on. IEEE,
27-31.
Deshmukh, O. and Mandakini, K. 2013. A overview of software verification &
validation and selection process. International Journal of Computer Trends and Technology,
4(2).
DPSA. 2014. Department: Public service and administration, republic of South
Africa. Available: http://www.dpsa.gov.za/documents.php (Accessed 17 Feb 2014).
Ebrahim, Z. and Irani, Z. 2005. E-government adoption: architecture and barriers.
Business Process Management Journal, 11(5): 589-611.
92
El-Bakry, H. M. and Mastorakis, N. 2009. User interface for internet applications. In:
Proceedings of Proceedings of the 9th WSEAS International Conference on APPLIED
INFORMATICS AND COMMUNICATIONS (AIC'09). 20-22.
Ellis, T. J. and Levy, Y. 2010. A guide for novice researchers: design and
development research methods. In: Proceedings of Informing Science & IT Education
Conference, Casino, Italy, pp. 107-118.,
Escalona, M. J. and Koch, N. 2004. Requirements engineering for web applications-a
comparative study.Journal of Web Engineering, 2(3), 193-212.
Fang, Z. 2002. E-government in digital era: concept, practice, and development.
International journal of the Computer, the Internet and management, 10(2): 1-22.
Fan, J. and Zhang, P. 2007. A conceptual model for G2G information sharing in E-
government environment. In: Proceedings of 6th Wuhan International Conference on E-
Business - e-Business Track, 199-204, Conference proceedings.
Fernando, N., Loke, S. W. and Rahayu, W. 2013. Mobile cloud computing: A survey.
Future Generation Computer Systems, 29(1): 84-106.
Glasgow, R. E., Ory, M. G., Klesges, L. M., Cifuentes, M., Fernald, D. H. and Green,
L. A. 2005. Practical and relevant self-report measures of patient health behaviors for primary
care research, The Annals of Family Medicine, 3(1): 73-81.
Grandison, T., Johnson, C. and Kiernan, J. 2008. Hippocratic databases: current
capabilities and future trends. In M. Gertz and S. Jajodia (Eds.), Handbook of database
security (pp. 409-429). New York, NY: Springer.
Grundén, K. (2012). Competence development of e-government: a study circle
approach. In: K. J. Bwalya and S. F. Zulu, Handbook for e-government in emerging
economies. Adoption, continuance usage, e-participation, and legal frameworks. (pp. 591-
604). IGI Global
93
Gugliotta, A., Cabral, L., Domingue, J., Roberto, V., Rowlatt, M., Council, E. C. and
Davies, R. 2005. A semantic web service-based architecture for the interoperability of e-
Government services. WISM 2005: 21.
Guijarro, L. 2007. Interoperability frameworks and enterprise architectures in e-
government initiatives in Europe and the United States. Government Information Quarterly,
24(1): 89-101.
Harrison, R., Flood, D. and Duce, D. 2013. Usability of mobile applications: literature
review and rationale for a new usability model. Journal of Interaction Science, 1(1): 1-16.
Harvey, F. and Tulloch, D. 2006. Local‐government data sharing: evaluating the
foundations of spatial data infrastructures. International Journal of Geographical Information
Science, 20(7): 743-768.
Heeks, R. 2001. Understanding e-governance for development. Institute for
Development Policy and Management Manchester, UK.
Helfert, M. and Donnellan, B. 2012. The case for design science utility -
evaluation of design science artefacts within the IT capability maturity framework.
International workshop on IT Artefact Design & Workpractice Intervention, Barcelona.
Hevner, A. and Chatterjee, S. 2010. Design research in information systems: theory
and practice. New York, NY: Springer.
Hevner, A. R., March, S. T., Park, J. and Ram, S. 2004. Design science in information
systems research. MIS quarterly, 28(1): 75-105.
Headayetullah, M., and Pradhan, G. K. 2009. Secure information sharing between
government intelligence agencies: an innovative protocol based on trust. International
Journal of Engineering and Technology, 1(4): 346-353.
94
Hwang, M. S., Li, C. T., Shen, J. J., & Chu, Y. P. (2004). Challenges in e-government
and security of information. Information & Security, 15(1): 9-20.
IDABC. 2009. Interoperable Delivery of European eGovernment Services to
public Administrations, Businesses and Citizens. Available: <http://ec.europa.eu/idabc/
(Accessed 25 September 2014).
Jaeger, P. T. and Thompson, K. M. 2003. E-government around the world: lessons,
challenges, and future directions. Government Information Quarterly, 20(4): 389-394.
Johnson, P. R. and Yang, S. 2009. Uses and gratifications of Twitter: An examination
of user motives and satisfaction of Twitter use. In: Proceedings of Communication
Technology Division of the annual convention of the Association for Education in Journalism
and Mass Communication in Boston, MA.
Juell-Skielse, G., and Perjons, E. 2009. Improving e-government through benefit
analysis and value modeling. In Computer Software and Applications Conference, 2009.
COMPSAC'09. 33rd Annual IEEE International 1: 332-339. IEEE.
Kaaya, J. 2004. Implementing e-government services in East Africa: assessing status
through content analysis of government websites. Electronic Journal of E-government, 2(1):
39-54.
Kallio, T. and Kaikkonen, A. 2005. Usability testing of mobile applications: a
comparison between laboratory and field testing. Journal of Usability studies, 1(4-16): 23-28.
Kamran, S. and Haas, O. C. 2011. Semantic agent-based controls for Service Oriented
Architecture (SOA) enabled Intelligent Transportation Systems (ITS). In: Proceedings of
Intelligent Transportation Systems (ITSC), 2011 14th International IEEE Conference on.
IEEE, 937-942
Karmokar, S., Singh, H. and Tan, F. B. 2013. A user-centered framework for website
evaluation. Natal, Brazil. CONF-IRM.
95
Kasim, R. S. R. 2008. The relationship of knowledge management practices,
competencies and the organizational performance of government departments in Malaysia.
International Journal of Social and Human Sciences, 2: 740-746.
Khan, F., Khan, S. and Zhang, B. 2010. E-government challenges in developing
countries: a case study of Pakistan. In: Proceedings of Management of e-Commerce and e-
Government (ICMeCG), 2010 Fourth International Conference on. IEEE, 200-203.
Kim, J. and Kim, H. J. 2010. Design of internal information leakage detection system
considering the privacy violation. In Information and Communication Technology
Convergence (ICTC), 2010 International Conference on (pp. 480-481). IEEE.
Li, A., Liu, J. and Ma, W. 2009. Research silverlight technology. Computer
Technology and Development, 19(6): 117-120.
Linders, D. (2012). From e-government to we-government: Defining a typology for
citizen coproduction in the age of social media. Government Information Quarterly, 29(4):
446-454.
Liu, P. and Chetal, A. (2005). Trust‐based secure information sharing between federal
government agencies. Journal of the American Society for Information Science and
Technology, 56(3): 283-298.
Lofstedt, U. 2012. E-government - assesment of current research and some proposals
for future directions. International Journal of Public Information Systems, 1(1): 39-52
Makedon, F., Sudborough, C., Baiter, B., Pantziou, G. and Conalis-Kontos, M. 2003.
A safe information sharing framework for e-government communication. IT white paper from
Boston University.
March, S. T. and Storey, V. C. 2008. Design science in the information systems
discipline: an introduction to the special issue on design science research. Management
Information Systems Quarterly, 32 (4): 6.
96
Massacci, F., Mylopoulos, J. and Zannone, N. 2006. Hierarchical hippocratic
databases with minimal disclosure for virtual organizations. The VLDB Journal, 15(4): 370-
387.
McMurtry, C., Mercuri, M. and Watling, N. 2006. Microsoft Windows communication
foundation: hands-on! Sams Publishing.
Meier, J., Farre, C., Taylor, J., Bansode, P., Gregersen, S., Sundararajan, M. and
Boucher, R. 2009. Improving Web Services Security: Scenarios and Implementation
Guidance for WCF. Microsoft Developer Network.
Meyer, M., Helfert, M., Donnellan, B. and Kenneally, J. 2012. Applying design
science research for enterprise architecture business value assessments. In: Design Science
Research in Information Systems. Advances in Theory and Practice. Springer, 108-121.
MicrosoftDeveloperNetwork. 2014a. Silverlight Overview. Available:
http://msdn.microsoft.com/en-us/library/bb404700(v=vs.95).aspx (Accessed 20 April 2014).
MicrosoftDeveloperNetwork. 2014b. Windows Communication Foundation [.NET
Framework 4.0]. Microsoft Developer Network: Microsoft Developer Network. Available:
http://msdn.microsoft.com/en-us/library/dd456779(v=vs.110).aspx (Accessed 05 March
2014)
Misuraca, G., Alfano, G. and Viscusi, G. 2011. Interoperability challenges for ICT-
enabled governance: towards a pan-European conceptual framework. Journal of theoretical
and applied electronic commerce research, 6 (1): 95-111.
Mkude, C. G. and Wimmer, M. A. (2014). Strategic aspects for successful e-
government systems design: insights from a survey in Germany. In Electronic Government
(pp. 301-312). Berlin: Springer.
97
Mohammed, M., Hasson, A. and Malaysia, M. 2012. Metadata technique with E-
government for Malaysian Universities. International Journal of Computer Science Issues
9(4): 234-238.
Mutula, S. M. 2008. Comparison of sub-Saharan Africa's e-government status with
developed and transitional nations. Information Management & Computer Security, 16(3):
235-250.
Ndou, V. 2004. E-government for developing countries: opportunities and challenges.
The Electronic Journal of Information Systems in Developing Countries, 18(1): 1-24.
Nkwe, N. 2012. E-government: challenges and opportunities in Botswana.
International Journal of Humanities and Social Science, 2(17): 39-48.
Nayebi, F., Desharnais, J.-M. and Abran, A. 2012. The state of the art of mobile
application usability evaluation. In: Proceedings of CCECE. 1-4
Oberholzer, H. H., Ojo, S. O. and Olugbara, O. O. 2012. A hippocratic privacy
protection framework for relational databases. African Journal of Computing & ICT. 5(5):
132-149.
Olugbara, O. O. and Ndhlovu, B. N. 2014. Constructing frugal sales system for small
enterprises. The African Journal of Information Systems, 6(4), 1.
Olugbara, O. O., Ojo, S. O. and Mphahlele, M. 2010. Exploiting image content in
location-based shopping recommender systems for mobile users. International Journal of
Information Technology & Decision Making, 9 (05): 759-778.
Ostberg, O. 2010. Swedish e-gov 2010: where is it coming from and where is it going.
International Journal of Public Information Systems, 6(2): 149-169
Padma, J., Silva, Y. N., Arshad, M. U., & Aref, W. G. (2009, March). Hippocratic
PostgreSQL. In Data Engineering, 2009. ICDE'09. IEEE 25th International Conference
on (pp. 1555-1558). IEEE.
98
Pries-Heje, J., Baskerville, R. and Venable, J. 2008. Strategies for design science
research evaluation. ECIS 2008 proceedings: 1-12.
Reffat, R. 2003. Developing a successful e-government. In: Proceedings of
Proceedings of the Symposium on E-government: Opportunities and Challenge, Muscat
Municipality, Oman, IV1-IV13.
Rewatkar, L. R. and Lanjewar, U. 2010. Implementation of cloud computing on web
application. International Journal of Computer Applications, 2(8).
Rorissa, A., Demissie, D. and Pardo, T. 2011. Benchmarking e-government: a
comparison of frameworks for computing e-government index and ranking. Government
Information Quarterly, 28(3): 354-362.
Rosengren, B. and Ohlsson, J. 2011. e-Government challenges - from applications to
complex solutions. In Management and Service Science (MASS), 2011 International
Conference on (pp. 1-4). IEEE.
Rubel, Thom 2011. Smart Government: Creating More Effective Information and
Services. Available: http://idc-insights-community.com/government. (Accessed 03 March
2014).
Sahraoui, S. 2007. E-inclusion as a further stage of e-government? Transforming
Government: People, Process and Policy, 1(1): 44-58.
Salunke, D., Upadhyay, A., Sarwade, A., Marde, V. and Kandekar, S. 2013. A survey
paper on role based access control. International Journal of Advanced Research in Computer
and Communication Engineering, 2(3): 1340-1342.
Sang, S., Lee, J.-D. and Lee, J. 2009. E-Government challenges in least developed
countries (LDCs): a case of Cambodia. In: Proceedings of Advanced Communication
Technology, 2009. ICACT 2009. 11th International Conference on. IEEE, 2169-2175
99
Satzinger, J. W., Jackson, R. B. and Burd, S. D. 2004. System Analysis and Design in
a Changing World. Boston, MA: Course Technology Press.
Scholl, H. J. 2007. Central research questions in e-government, or which trajectory
should the study domain take? Transforming Government: People, Process and Policy, 1(1):
67-88.
Scholtz, J. and Consolvo, S. 2004. Toward a framework for evaluating ubiquitous
computing applications. Pervasive Computing, IEEE, 3(2): 82-88.
Seshadri, P. and Garrett, P. 2000. SQLServer for windows CE—a database engine for
mobile and embedded platforms. In: Proceedings of 2013 IEEE 29th International
Conference on Data Engineering (ICDE). IEEE Computer Society, 642-642
Sheikh, J. A., Dar, H. S. and Sheikh, F. J. 2014. Usability guidelines for designing
knowledge base in rural areas. In Design, User Experience, and Usability. User Experience
Design for Everyday Life Applications and Services (pp. 462-469). New York, NY:Springer
International Publishing.
Sinawong, S. 2008. The influential factors and challenges in implementing e-
Government in Cambodia. In Convergence and Hybrid Information Technology, 2008.
ICCIT'08. Third International Conference on 2: 973-979. IEEE.
Singh, S. and Karaulia, D. S. 2011. E-governance: information security issues. In
Proceedings of the International Conference on Computer Science and Information
Technology (pp. 120-124).
Skinner, G. and Chang, E. 2006. A conceptual framework for information privacy and
security in collaborative environments. International Journal of Computer Science and
Network Security, 6(2): 166-172.
Skonnard, A. 2006. Distributed. NET-Learn The ABCs Of Programming Windows
Communication Foundation. MSDN Magazine: 44-55.
100
Sonnenberg, C. and vom Brocke, J. 2012. Evaluation patterns for design science
research artefacts. In: Practical Aspects of Design Science. Springer, 71-83.
Tallo. 2013. E-Estonia Digital identity: necessary part of e-gov infrastrucrure
governance Paper Available:
http://www.eiseverywhere.com/file_uploads/4330139d7486ef35135305038c97bda2_TALLO
digital_identity_WCO.pdf. (Accessed 10 June 2014).
Tsai, N., Choi, B. and Perry, M. 2009. Improving the process of E-Government
initiative: an in-depth case study of web-based GIS implementation. Government Information
Quarterly, 26(2): 368-376.
Thakur, S. and Singh, S. 2012. A study of some e-Government activities in South
Africa. In: Proceedings of Sustainable e-Government and e-Business Innovations (E-
LEADERSHIP), 2012 e-Leadership Conference on. IEEE, 1-11.
Tillmann, N., de Halleux, J. and Xie, T. 2010. Parameterized unit testing: Theory and
practice. In: Proceedings of Software Engineering, 2010 ACM/IEEE 32nd International
Conference on. IEEE, 483-484.
Tulloch, D. L. and Harvey, F. 2007. When data sharing becomes institutionalized:
Best practices in local government geographic information relationships. URISA Journal,
19(2): 51-59.
Vaishnavi, V. Kuechler, W. 2004. Design research in information systems. Available:
http://desrist. org/design-research-in-information-systems. (Accessed 10 November 2015).
Von Alan, R. H., March, S. T., Park, J. and Ram, S. 2004. Design science in
information systems research. MIS quarterly, 28(1): 75-105.
Wahid, M. and Almalaise, A. 2011. JUnit framework: An interactive approach for
basic unit testing learning in Software Engineering. In: Proceedings of Engineering
Education (ICEED), 2011 3rd International Congress on. IEEE, 159-164.
101
Wang, H. and Hou, J. 2010. Perspectives, skills and challenges for developing a
successful E-Government. In: Proceedings of Advanced Management Science (ICAMS), 2010
IEEE International Conference on. IEEE, 242-245.
Wimmer, M., Codagnone, C. and Janssen, M. 2008. Future e-government research: 13
research themes identified in the eGovRTD2020 project. In Hawaii International Conference
on System Sciences, Proceedings of the 41st Annual (pp. 223-223). IEEE.
Xu, Q., Jiao, R. J., Yang, X., Helander, M., Khalid, H. M. and Opperud, A. 2009. An
analytical Kano model for customer need analysis. Design Studies, 30(1): 87-110.
Xu, W. and Zhou, G. 2008. The Development of E-government in China: Challenges
and the Future. In: Proceedings of 2008 4th International Conference on Wireless
Communications, Networking and Mobile Computing. 1-3.
Yang, Y., Hu, X., Qu, Q., Lai, F., Shi, Y., Boswell, M., & Rozelle, S. (2013). Roots
of Tomorrow's Digital Divide: Documenting Computer Use and Internet Access in China's
Elementary Schools Today. China & World Economy, 21(3), 61-79.
Yanqing, G. 2011a. Analysis on how to enhance e-democracy through e-government.
In Proceedings of 2011 IEEE International Conference on Management and Service Science
(MASS).